Advanced Search
Volume 28 Issue 8
Sep.  2010
Turn off MathJax
Article Contents
Li Xin-guo, Ge Jian-hua, Zhao Chun-ming. Smartcard-Based System for Multicast Content Protection and Payment[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1497-1500.
Citation: Li Xin-guo, Ge Jian-hua, Zhao Chun-ming. Smartcard-Based System for Multicast Content Protection and Payment[J]. Journal of Electronics & Information Technology, 2006, 28(8): 1497-1500.

Smartcard-Based System for Multicast Content Protection and Payment

  • Received Date: 2004-11-24
  • Rev Recd Date: 2005-10-31
  • Publish Date: 2006-08-19
  • Content protection is the key issue to perform digital content transactions on the web. It is impractical for commercial multicast assuming that all group members know the group key in traditional multicast key management schemes. The proposed design for multicast content protection and payment system is based on the secure smartcard assumption under which both attackers and card holder are not able to obtain the private key and group key stored in the smartcard. Identity-based encryption scheme is introduced in the system to avoid using public key certificates. The system can guarantee the secrecy of content transmission with other features like simplicity for identification, content authentication, key management and anonymity for payments.
  • loading
  • MicroSoft Media Player. www.microsoft.com.[2] DTCP Specification Version 1.3. www.dtcp.com.[3]Boneh D, Franklin M. Identity based encryption from Weil pairing. CRYPTO 2001, Berlin: Springer-Verlag, 2001: 213-229.[4]Tu F K, Laih C S, Tung H H. On key distribution management for conditional access system on pay-TV system[J].IEEE Transactions on Consumer Electronics.1999, 45(1):151-158[5]Gennaro R, Lysyanskaya A, Malkin T, Micali S, Rabin T. Algorithmic Tamper-Proof (ATP) security: Theoretical foundations for security against hardware tampering. TCC 2004, LNCS 2951, Berlin, Heidelberg, Springer-Verlag 2004: 258-277.[6]Schneier B, Shostack A. Breaking up is hard to do: Modeling security threats for smart cards. USENIX Workshop on Smart Card Technology, Chicago, USENIX Press, 1999: 175-185.[7]Fenner W. Internet Group Management Protocol Version 2, RFC 2236, IETF, 1997.[8]Hess F. Efficient identity based signature schemes based on pairings. Selected Areas in Cryptography 9th Annual International Workshop, London, Springer-Verlag, SAC 2002, LNCS 2595: 310-324.[9]Ballardie T, Francis P, Crowcroft J. Core based trees: An architecture for scalable inter-domain multicast routing. In proc. ACM SIGCOMM, ACM, San Francisco, 1993: 85-95.[10]Mittra S. Iolus: A framework for scalable secure multicasting. In Proc. ACM SIGCOMM, Cannes, France, 1997: 277-288.[11]Canetti R, Garay J, Pinkas B. Multicast security: A taxonomy and some efficient constructions. In Proc. INFOCOM'99, New York, 1999, V. 2: 708-716.[12]Wong C K, Gouda M, Lam S S. Secure group communications using key graphs[J].IEEE/ACM Transactions on Networking.2000, 8(1):16-30[13]Swanson M D, Kobayashi M, Tewfik A H. Multimedia data embedding and watermarking techniques, Proc[J].IEEE.1998, 86(6):1064-1087
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2098) PDF downloads(721) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return