Practical key distribution schemes for channel protection

Yu-Lun Huang*, Shiuhpyng Shieh, Jian Chyuan Wang

*Corresponding author for this work

Research output: Contribution to journalConference article

1 Scopus citations

Abstract

This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authorized subscribers efficiently and securely. In these schemes, for key updates, at most two messages are transmitted and simpler computation functions, including one-way hash function and XOR operation, are used to reduce the computation cost compared to existing solutions. With our key distribution schemes, only the authorized subscribers can decrypt the ordered programs. Thus, the service provider in a Pay-TV system can charge his subscribers according to their subscriptions and the intelligent property rights of TV programs can be protected by the proposed schemes.

Original languageEnglish
Pages (from-to)569-574
Number of pages6
JournalProceedings - IEEE Computer Society's International Computer Software and Applications Conference
DOIs
StatePublished - 1 Dec 2000
Event2000 IEEE 24th Annual International Computer Software and Applications Conference (COMPSAC 2000) - Taipei, Taiwan
Duration: 25 Oct 200027 Oct 2000

Fingerprint Dive into the research topics of 'Practical key distribution schemes for channel protection'. Together they form a unique fingerprint.

Cite this