메뉴 건너뛰기




Volumn 6, Issue 3, 2013, Pages 361-372

A privacy-preserving acceleration authentication protocol for mobile pay-TV systems

Author keywords

Authentication; Batch verification; Delegation; Mobile pay TV; Security

Indexed keywords

AUTHENTICATION; COMMUNICATION;

EID: 84874319277     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.584     Document Type: Article
Times cited : (9)

References (28)
  • 1
    • 84874326449 scopus 로고
    • Conditional-access broadcasting system, ITU-R Rec. 810
    • Conditional-access broadcasting system, ITU-R Rec. 810, 1992.
    • (1992)
  • 3
    • 0042196056 scopus 로고    scopus 로고
    • Pay-TV system with strong privacy and nonrepudiation protection
    • Song R, Korba L. Pay-TV system with strong privacy and nonrepudiation protection. IEEE Transactions on Consumer Electronics 2003; 49(2): 408-413.
    • (2003) IEEE Transactions on Consumer Electronics , vol.49 , Issue.2 , pp. 408-413
    • Song, R.1    Korba, L.2
  • 4
    • 84874324192 scopus 로고    scopus 로고
    • Head-end implementation of DVB simulcrypt, ETSI Standard, ETSI TS 103 197V1.4.1
    • Head-end implementation of DVB simulcrypt, ETSI Standard, ETSI TS 103 197V1.4.1, 2004.
    • (2004)
  • 5
    • 68549115315 scopus 로고    scopus 로고
    • An efficient authentication scheme for access control in mobile pay-TV systems
    • Sun HM, Leu MC. An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Transactions on Multimedia 2009; 11(5):947-959.
    • (2009) IEEE Transactions on Multimedia , vol.11 , Issue.5 , pp. 947-959
    • Sun, H.M.1    Leu, M.C.2
  • 6
    • 0033157562 scopus 로고    scopus 로고
    • An alternative paradigm for scalable on-demand applications: evaluating and deploying the interactive multimedia jukebox
    • Almeroth KC, Ammar MH. An alternative paradigm for scalable on-demand applications: evaluating and deploying the interactive multimedia jukebox. IEEE Transactions on Knowledge and Data Engineering 1999; 11(4):658-672.
    • (1999) IEEE Transactions on Knowledge and Data Engineering , vol.11 , Issue.4 , pp. 658-672
    • Almeroth, K.C.1    Ammar, M.H.2
  • 7
    • 0036688566 scopus 로고    scopus 로고
    • A recursive frequency-splitting scheme for broadcasting hot videos in VOD service
    • Tseng Y, Yang M, Chang C. A recursive frequency-splitting scheme for broadcasting hot videos in VOD service. IEEE Transactions on Communications 2002; 50(8):1348-1355.
    • (2002) IEEE Transactions on Communications , vol.50 , Issue.8 , pp. 1348-1355
    • Tseng, Y.1    Yang, M.2    Chang, C.3
  • 8
    • 84936892450 scopus 로고
    • Cryptology for digital TV broadcasting
    • Macq BM, Quisquater J. Cryptology for digital TV broadcasting. Proceedings of the IEEE 1995; 83(6):944-957.
    • (1995) Proceedings of the IEEE , vol.83 , Issue.6 , pp. 944-957
    • Macq, B.M.1    Quisquater, J.2
  • 10
    • 33646444631 scopus 로고    scopus 로고
    • Conditional access in mobile systems: securing the application. In Proceedings of First International Conference on Distributed Frameworks for Multimedia Applications (DFMA05)
    • Gallery E, Tomlinson A. Conditional access in mobile systems: securing the application. In Proceedings of First International Conference on Distributed Frameworks for Multimedia Applications (DFMA05), 2005; 190-197.
    • (2005) , pp. 190-197
    • Gallery, E.1    Tomlinson, A.2
  • 11
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups. In Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography (PKC′03)
    • Cha JC, Cheon JH. An identity-based signature from gap Diffie-Hellman groups. In Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography (PKC′03), 2003; 18-30.
    • (2003) , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 14
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation 1987; 48(177):203-209.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 20
    • 0029717329 scopus 로고    scopus 로고
    • Proxy signatures for delegating signing operation. In Proceedings of the 3rd ACM Conference on Computer and Communications Security.;
    • Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. In Proceedings of the 3rd ACM Conference on Computer and Communications Security. 1996; 48-57.
    • (1996) , pp. 48-57
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 21
    • 58149108946 scopus 로고    scopus 로고
    • An efficient mobile authentication scheme for wireless networks
    • Tang C, Wu DO. An efficient mobile authentication scheme for wireless networks. IEEE Transactions on Wireless Communications 2008; 7(1):1408-1416.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.1 , pp. 1408-1416
    • Tang, C.1    Wu, D.O.2
  • 22
    • 78649983188 scopus 로고    scopus 로고
    • A fast handover authentication mechanism based on ticket for IEEE 802.16m
    • Fu A, Zhang Y, Zhu Z, Liu X. A fast handover authentication mechanism based on ticket for IEEE 802.16m. IEEE Communications Letters 2010; 14(12):1134-1136.
    • (2010) IEEE Communications Letters , vol.14 , Issue.12 , pp. 1134-1136
    • Fu, A.1    Zhang, Y.2    Zhu, Z.3    Liu, X.4
  • 23
    • 67349168446 scopus 로고    scopus 로고
    • BAT: a robust signature scheme for vehicular networks using binary authentication tree
    • Jiang Y, Shi M, Shen X, Lin C. BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Transactions on Wireless Communications 2009; 8(4): 1974-1983.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.4 , pp. 1974-1983
    • Jiang, Y.1    Shi, M.2    Shen, X.3    Lin, C.4
  • 24
    • 84976770858 scopus 로고
    • Responses to NIST's proposal
    • Vanstone S. Responses to NIST's proposal. Communications of the ACM 1992; 35(7):41-54.
    • (1992) Communications of the ACM , vol.35 , Issue.7 , pp. 41-54
    • Vanstone, S.1
  • 25
    • 84874329804 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis. In Proceedings of the 6th IMA International Conference on Cryptography and Coding
    • Blake-Wilson S, Johnson D, Menezes A. Key agreement protocols and their security analysis. In Proceedings of the 6th IMA International Conference on Cryptography and Coding, 1997.
    • (1997)
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 27
    • 1842715081 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • Lauter K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 2004; 11(1):62-67.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 62-67
    • Lauter, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.