Extension of Broadcasting Service by Using Electronic Tokens

In the current broadcasting system or Internet content distribution system, content providers distribute decoders (STB) that contain secret keys for content decryption, prior to content distribution. A content provider sends encrypted content to each user, who then decodes it with his or her STB. While users can get the services at their houses if they have an STB, it is hard for them to get the services outside their houses. A system that allowed users to carry around their secret keys would improve usability, but it would require countermeasures against secret key exposure. In this paper, we propose such an extended broadcasting system using tokens and group signature. The content providers can control the number of keys that users can use outside their houses. The system enables the broadcasters to minimize the damage caused by group signature key exposures and the user to get services outside his or her home.

[1]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[2]  Aggelos Kiayias,et al.  Extracting Group Signatures from Traitor Tracing Schemes , 2003, EUROCRYPT.

[3]  Hideki Imai,et al.  Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[4]  Hideki Imai,et al.  A secure traitor tracing scheme against key exposure , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[5]  Hideki Imai,et al.  Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service , 2006, ACISP.

[6]  Kaoru Kurosawa,et al.  Linear Code Implies Public-Key Traitor Tracing , 2002, Public Key Cryptography.

[7]  Matthew K. Franklin,et al.  An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.

[8]  Hideki Imai,et al.  A Provably Secure Refreshable Partially Anonymous Token and Its Applications , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[9]  Shouhuai Xu,et al.  Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.

[10]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[11]  Yvo Desmedt,et al.  Optimum Traitor Tracing and Asymmetric Schemes , 1998, EUROCRYPT.

[12]  Hideki Imai,et al.  Anonymous authentication scheme for XML security standard with Refreshable Tokens , 2003, XMLSEC '03.