logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 5: 052108(2016) https://doi.org/10.1007/s11432-015-5469-5

One-to-many authentication for access control in mobile pay-TV systems

More info
  • ReceivedMay 31, 2015
  • AcceptedJul 7, 2015
  • PublishedApr 11, 2016

Abstract

In traditional authentication schemes for access control in mobile pay-TV systems, one-to-one delivery is used, i.e., one authentication message per request is delivered from a head-end system (HES) to a subscriber. The performance of one-to-one delivery for authentication is not satisfactory as it requires frequent operations which results in high bandwidth consumption. To address this issue, one-to-many authentication for access control in mobile pay-TV systems was developed. It requires only one broadcasted authentication message from a HES to subscribers if there are many requests for the same service in a short period of time. However, later it was revealed that the one-to-many authentication scheme was vulnerable to an impersonation attack, i.e., an attacker without any secret key could not only impersonate the mobile set (MS) to the HES but also impersonate the HES to the MS. Then, a new scheme has been recently introduced for secure operations of one-to-many authentication. However, as shown in this paper, the recent work for one-to-many authentication is still vulnerable to the impersonation attack. To mitigate this attack, in this paper, a new scheme for one-to-many authentication using bilinear pairing is proposed that eliminates security weaknesses in the previous work. Results obtained depict that the new improved scheme in this paper provides better performance in terms of computation and communication overheads.


Funded by

Basic Science Research Program and Next-Generation Information Computing Development Program through the National Research Foundation of Korea(NRF)

funded by the Ministry of Science ICT and Future Planning(NRF-2014M3C4A7030648)

funded by the Ministry of Science ICT and Future Planning(NRF-2014R1A1A1006770)


Acknowledgment

Acknowledgments

The work of D. He was supported in part by the National Natural Science Foundation of China (Grant Nos. 61373169, 61572379, 61501333), National High Technology Research and Development Program of China (863 Program) (Grant No. 2015AA016004), Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund through Fujian Normal University (Grant No. 15011), and Natural Science Foundation of Hubei Province of China (Grant No. 2015CFB257). The work of J.-H. Lee was supported by Basic Science Research Program and Next-Generation Information Computing Development Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (Grant Nos. NRF-2014R1A1A1006770, NRF-2014M3C4A7030648).


References

[1] Shirazi H, Cosmas J, Cutts D. IEEE Trans Broadcast, 2011, 56: 44-56 Google Scholar

[2] Diaz-Sanchez D, Marin A, Almenarez F, et al. IEEE Trans Consum Electron, 2009, 55: 88-96 Google Scholar

[3] ITU-R. Conditional-Access Broadcasting System. BT.810. https://www.itu.int/rec/R-REC-BT.810/en. 1992. Google Scholar

[4] Huang Y, Shish S, Ho F, et al. IEEE Trans Multimedia, 2004, 6: 760-769 Google Scholar

[5] Wang S, Laih C. IEEE Trans Multimedia, 2008, 10: 480-492 Google Scholar

[6] Sun H, Chen C, Shieh C. IEEE Trans Multimedia, 2008, 10: 1109-1120 Google Scholar

[7] Zhu W. IEEE Trans Multimedia, 2008, 10: 1214-1220 Google Scholar

[8] Digital Video Broadcasting (DVB). IP Datacast over DVB-H: Service Purchase and Protection. ETSI TS 102 474 v1.1.1 Std. https://www.etsi.org/deliver/etsi\_ts/102400\_102499/102474/01.02.01\_60/ts\_102474v010201p.pdf. 2007. Google Scholar

[9] Lee N, Chang C, Lin C, et al. IEEE Trans Consum Electron, 2000, 46: 20-27 Google Scholar

[10] Song R, Korba L. IEEE Trans Consum Electron, 2003, 49: 408-413 Google Scholar

[11] Yeung S, Lui J, Yau D. IEEE Trans Multimedia, 2005, 7: 330-338 Google Scholar

[12] Roh D, Jung S. An authentication scheme for consumer electronic devices accessing mobile IPTV service from home networks. In: Proceedings of the 29th International Conference on Consumer Electronics, Las Vegas, 2011. 717-718. Google Scholar

[13] Sun S, Leu M. IEEE Trans Multimedia, 2009, 11: 947-959 Google Scholar

[14] Koblitz N. Math Comput, 1987, 48: 203-209 Google Scholar

[15] Wang H, Qin B. IET Inform Secur, 2012, 6: 281-290 Google Scholar

[16] Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks. In: Advances in Cryptology-EUROCRYPT. Berlin: Springer, 2000. 139-155. Google Scholar

[17] Cha J, Cheon J. An identity-based signature from gap diffie-Hellman groups. In: Proceedings of International Conference on Practice and Theory in Public-Key Cryptography, Miami, 2003. 18-30. Google Scholar

[18] Pointcheval D, Stern J. J Cryptol, 2000, 13: 361-396 Google Scholar

[19] Ren Y, Shen J, Wang J, et al. J Internet Techno, 2015, 16: 317-323 Google Scholar

[20] He D, Kumar N, Chilamkurti N. Inf Sci, 2015, 321: 263-277 Google Scholar

[21] He D, Zeadally S. IEEE Commun Mag, 2015, 35: 71-77 Google Scholar

[22] Guo P, Wang J, Li B, et al. J Internet Techno, 2014, 15: 929-936 Google Scholar

[23] Shen J, Tan H, Wang J, et al. J Internet Techno, 2015, 16: 171-178 Google Scholar

[24] He D, Zhang Y, Chen J. Wirel Pers Commun, 2014, 74: 229-243 Google Scholar

[25] Scott M, Costigan N, Abdulwaha W. Implementing cryptographic pairings on smartcards. In: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, 2006. 134-147. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1