DOI QR코드

DOI QR Code

서로 다른 DCAS 간 효율적 상호운용을 위한 키 생성 및 관리 기법

Key Generation and Management Scheme for Efficient Interoperability among Different Downloadable Conditional Access Systems

  • 투고 : 2012.07.31
  • 심사 : 2012.11.08
  • 발행 : 2013.02.28

초록

제한수신시스템(Conditional Access System, CAS)은 사용자의 조건에 따라 방송에 대한 접근을 제어하는 시스템으로 유료 TV 시스템에서 인가된 사용자만이 해당 프로그램에 접근할 수 있도록 하는 콘텐츠 보안 기술이다. 최근에는 기존의 하드웨어 기반 CAS가 가지는 이기종 기기간 호환성, 다른 서비스와의 연동 등의 문제를 해결하고자 CAS의 클라이언트를 소프트웨어로 구현하여 네트워크를 통해 전송하는 다운로드가 가능한 제한수신시스템(Downloadable CAS, DCAS)에 대한 연구와 개발이 활발히 진행되고 있다. 본 논문에서는 서로 다른 DCAS 간 효율적인 상호운용이 가능한 PBC(Pairing Based Cryptography) 기반의 키 생성 및 관리 기법을 제안한다.

CAS (Conditional Access System) is a content protection solution that restricts access to the system according to user's standing and only authorized users can access the content in a pay-TV system. DCAS (Downloadable Conditional Access System) can download CAS client which is a software implemented via network. In recent years, research and development has been carried out on DCAS to solve the problems of compatibility among heterogeneous devices and internetworking with other services. In this paper, we propose key generation and management scheme for efficient interoperability among different DCASs based on PBC (Pairing Based Cryptography).

키워드

참고문헌

  1. EBU Project Group B/CA, "Functional model of a conditional access system," EBU Technical Review, pp.64-77, 1995.
  2. J.Y. Moon, B.J. Oh, and E.H. Park, "Trends on Technologies for Interoperability of Various Conditional Access Systems," ETRI Electronics and Telecommunications Trends, Vol.21, No.5, pp.21-29, 2006.
  3. ETSI TS 103 197 v1.4.1, Digital Video Broadcasting(DVB) Head-end implementation of DVB Simulcrypt, 2004.
  4. Common Interface Specification for Conditional Access and Other Digital Video Broadcasting Applications, EN50221, 1997.
  5. Cable Television Labortories, Inc., "OpenCable DCAS System Overview Technical Report," OC-TR-DCAS-D01-060 206, 2006.
  6. F. Kamperman and B. Rijnsoever, "Conditional Access System Interoperability Through Software Downloading," IEEE Transaction on Consumer Electronics, Vol.47, No.1, pp.47-54, 2001. https://doi.org/10.1109/30.920419
  7. Y. Jeong, S. Kim, H. Kim, H. Koo and E. Kwon, "A Novel Protocol for Downloadable CAS," IEEE Transaction on Consumer Electronics, Vol.54, No.3, pp.1236-1243, art. No.65, 2008. https://doi.org/10.1109/TCE.2008.4637612
  8. H. Jeong, S. Kim and D. Won, "On the Security of an Novel Protocol for Downloadable CAS," International Conference on Ubiquitous Information Management and Communication (ICUIMC), art. No.65, 2012.
  9. S. Kang,, J. Park, E. Paik, C. Park, and J. Ryou, "Technique and Implementation of Secure Downloadable Conditional Access System," Journal of The Korea Institute of Information Security & Cryptology (KIISC), Vol.19, No.6, pp.161-174. 2009.
  10. H. Choi, D. Yeo, J. Jang, and H. Youm, "Proposal of a Mutual Authentication and Key Management scheme based on SRP protocol," Journal of The Korea Institute of Information Security & Cryptology (KIISC), Vol.20, No.3, pp.53-65, 2010.
  11. D. Cho, B. Koh, and S. Yeo, "Secure D-CAS System for Digital Contetns Downloading Service," The Journal of Supercomputing, pp.1-15, 2011.
  12. H. Koo, O. Kwon, and S. Lee, "Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices," ETRI Journal, Vol.32, No.2, pp.204-213, 2010. https://doi.org/10.4218/etrij.10.1409.0077
  13. S. Kim, Y. Jeong, O. Kwon, and J. Chung, "Method for Efficient CA Software Provisioning in Downloadable Conditional Access System," IEEE International Symposium on Comsumer Electronics (ISCE), pp.335-338, 2011.
  14. Y. Jeong, S. Kim, O. Kwon, C. Ahn and J. Hong, "Design and Implementation of Headend Servers for Downloadable CAS," IEEE International Conference on Comsumer Electronics (ICCE), pp.727-728, 2011.
  15. W. You, J. Lee, Y. Cho, O. Kwon, and S. Lee, "Design and Implementation of DCAS User Terminal," IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, (BMSB), pp.1-5, 2011.
  16. J. Moon, J. Kim, J. Park, and E. Paik, "Achieving Interoperability in Conditional Access Systems through the Dynamic Download and Execution of Cryptographic Software for the IPTV System," International Conference on Convergence and Hybrid Information Technology (ICCHIT), pp.380-385, 2008.
  17. D. Boneh and M. Franklin, "Identity-based Encryption from the Weil Pairing," Advances in Cryptology, Crypto '01, LNCS Vol.2139, pp.213-229, 2001.
  18. W. Shin, K. Fukushima, S. Kiyomoto, and Y. Miyake, "AMY: Use your cell phone to create a protected personal network over devices," IEEE Transactions on Consumer Electronics, Vol.57, No.1, pp.99-104, 2011. https://doi.org/10.1109/TCE.2011.5735487