메뉴 건너뛰기




Volumn , Issue , 2011, Pages 547-552

ECC-based key exchange protocol for IPTV service

Author keywords

IPTV broadcasting; Key exchange; Security; Set top box; Smart card

Indexed keywords

BROADCASTING SERVICE; COMPUTATIONAL COSTS; CONDITIONAL ACCESS SYSTEMS; CONTROL WORDS; DIFFIE-HELLMAN KEY EXCHANGE; ELLIPTIC CURVE; ELLIPTIC CURVE CRYPTOGRAPHY; ELLIPTIC CURVE CRYPTOSYSTEM; EXECUTION TIME; IPTV SERVICES; KEY EXCHANGE; KEY EXCHANGE PROTOCOLS; LEGAL RIGHTS; LOW POWER; MEMORY REQUIREMENTS; ONE WAY HASH FUNCTIONS; PERFECT FORWARD SECRECY; SECURE COMMUNICATIONS; SECURE SESSION; SECURITY; SERVICE PROVIDER; SET TOP BOX; UNAUTHORIZED USERS;

EID: 83755172657     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICTC.2011.6082658     Document Type: Conference Paper
Times cited : (3)

References (22)
  • 1
    • 0035245703 scopus 로고    scopus 로고
    • Conditonal access system interoperability through software downloading
    • F. Kamperman and B.V. Rijnsoever, "Conditonal access system interoperability through software downloading," IEEE Trans. on Consumer Electronics, vol. 47, no. 1, pp. 47-53, 2001.
    • (2001) IEEE Trans. on Consumer Electronics , vol.47 , Issue.1 , pp. 47-53
    • Kamperman, F.1    Rijnsoever, B.V.2
  • 2
    • 0142007845 scopus 로고    scopus 로고
    • Security enhancement for protecting password transmission
    • C.C. Yang, T.Y. Chang, and J.W. Li, "Security enhancement for protecting password transmission," IEICE Transactions on Communications, vol. E86-B, no. 7, pp. 2178-2181, 2003.
    • (2003) IEICE Transactions on Communications , vol.E86-B , Issue.7 , pp. 2178-2181
    • Yang, C.C.1    Chang, T.Y.2    Li, J.W.3
  • 3
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • C.L. Lin and T. Hwang, "A password authentication scheme with secure password updating," Computers & Security, vol. 22, no. 1, pp. 68-72, 2003.
    • (2003) Computers & Security , vol.22 , Issue.1 , pp. 68-72
    • Lin, C.L.1    Hwang, T.2
  • 4
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • Crypto'89
    • C.P. Schnorr, "Efficient identification and signatures for smart cards," In Crypto'89, LNCS 435, pp. 235-251, 1990.
    • (1990) LNCS , vol.435 , pp. 235-251
    • Schnorr, C.P.1
  • 7
    • 84936892450 scopus 로고
    • Cryptology for digital TV broadcasting
    • B. Macq and J. Quisquater, "Cryptology for digital TV broadcasting," Proceedings of the IEEE, vol. 83, no. 6, pp. 944-957, 1995.
    • (1995) Proceedings of the IEEE , vol.83 , Issue.6 , pp. 944-957
    • Macq, B.1    Quisquater, J.2
  • 8
    • 0032626528 scopus 로고    scopus 로고
    • On key distribution management for conditional access system on pay-TV system
    • F.K. Tu, C.S. Laih, andH.H. Tung, "On key distribution management for conditional access system on pay-TV system,"IEEE Trans. Consum. Electr, vol. 45, pp. 151-158, 1999.
    • (1999) IEEE Trans. Consum. Electr , vol.45 , pp. 151-158
    • Tu, F.K.1    Laih, C.S.2    Tung, H.H.3
  • 9
    • 1942423668 scopus 로고    scopus 로고
    • Key distribution based on hierarchical access control for conditional access system in DTV broadcast
    • T. Jiang, S. Zheng, andB. Liu, "Key distribution based on hierarchical access control for conditional access system in DTV broadcast," IEEE Trans. Consum. Electr., vol.50 no. 1, pp. 225-230, 2004.
    • (2004) IEEE Trans. Consum. Electr. , vol.50 , Issue.1 , pp. 225-230
    • Jiang, T.1    Zheng, S.2    Liu, B.3
  • 10
    • 33947392992 scopus 로고    scopus 로고
    • A secure YS-like user authentication scheme
    • T.H Chen, G. Horng, and K.C. Wu, "A secure YS-like user authentication scheme," Informatica, vol. 18, no. 1, pp. 27-36, 2007.
    • (2007) Informatica , vol.18 , Issue.1 , pp. 27-36
    • Chen, T.H.1    Horng, G.2    Wu, K.C.3
  • 11
    • 33947405259 scopus 로고    scopus 로고
    • An efficient two-party identity-based key exchange protocol
    • Y.M. Tseng, "An efficient two-party identity-based key exchange protocol," Informatica, vol. 18, no. 1, pp. 125-136, 2007.
    • (2007) Informatica , vol.18 , Issue.1 , pp. 125-136
    • Tseng, Y.M.1
  • 12
    • 33947396398 scopus 로고    scopus 로고
    • Key agreement protocol (KAP) using conjugacy and discrete logarithm problems in group representation level
    • E. Sakalauskas, P. Tvarijonas, and A. Raulynaitis, "Key agreement protocol (KAP) using conjugacy and discrete logarithm problems in group representation level," Informatica, vol. 18, no. 1, pp. 115-124, 2007.
    • (2007) Informatica , vol.18 , Issue.1 , pp. 115-124
    • Sakalauskas, E.1    Tvarijonas, P.2    Raulynaitis, A.3
  • 13
    • 42149157246 scopus 로고    scopus 로고
    • Public key authentication schemes for local area networks
    • T.H Chen, G. Horng, and C.S. Yang, "Public key authentication schemes for local area networks," Informatica, vol. 19, no. 1, pp. 3-16, 2008.
    • (2008) Informatica , vol.19 , Issue.1 , pp. 3-16
    • Chen, T.H.1    Horng, G.2    Yang, C.S.3
  • 14
    • 47949104161 scopus 로고    scopus 로고
    • A pairing-based user authentication scheme for wireless clients with smart cards
    • Y.M. Tseng, T.Y. Wu, and J.D. Wu, "A pairing-based user authentication scheme for wireless clients with smart cards,"Informatica, vol. 19, no. 2, pp. 285-302, 2008.
    • (2008) Informatica , vol.19 , Issue.2 , pp. 285-302
    • Tseng, Y.M.1    Wu, T.Y.2    Wu, J.D.3
  • 15
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48, pp. 203-209, 1987.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 16
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • Proc of CRYPTO'85, Springer, Berlin
    • V. Miller, "Uses of elliptic curves in cryptography," In: Proc of CRYPTO'85, Lecture notes in computer science, vol. 218, Springer, Berlin, pp. 417-426, 1986.
    • (1986) Lecture Notes in Computer Science , vol.218 , pp. 417-426
    • Miller, V.1
  • 18
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, "New directions in cryptography,"IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 20
    • 6944222739 scopus 로고    scopus 로고
    • Secure communication between set-top box and smart card in DTV broadcasting
    • T. Jiang, Y. Hou, and S. Zheng, "Secure communication between set-top box and smart card in DTV broadcasting,"IEEE Trans. Consum. Electr, vol. 50, no. 3, pp. 882-886, 2004.
    • (2004) IEEE Trans. Consum. Electr , vol.50 , Issue.3 , pp. 882-886
    • Jiang, T.1    Hou, Y.2    Zheng, S.3
  • 21
    • 62449114806 scopus 로고    scopus 로고
    • Robust key exchange protocol between set-top box and smart card in DTV broadcasting
    • E.J. Yoon and K.Y. Yoo, "Robust key exchange protocol between set-top box and smart card in DTV broadcasting,"Informatica, vol. 20, no. 1, pp. 139-150, 2009.
    • (2009) Informatica , vol.20 , Issue.1 , pp. 139-150
    • Yoon, E.J.1    Yoo, K.Y.2
  • 22
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of encrypted key exchange," ACM Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.