TY - GEN
T1 - Privacy Preservation for Versatile Pay-TV Services
AU - Ogawa, Kazuto
AU - Nuida, Koji
N1 - Publisher Copyright:
© 2019, Springer Nature Switzerland AG.
PY - 2019
Y1 - 2019
N2 - In pay-TV services, content is encrypted and transmitted to subscribers. Each subscriber has a security module that holds a decryption key(s) for the encrypted content. A set-top box or a smart card is often used as the security module. When a subscriber wants to obtain the same services outside the home, the subscriber has to bring the security module. However, even if the security module is a card, it is not easy to take it out because of the structure of TV sets and set-top boxes. As a way of improving current pay-TV services, Ogawa, Tamura, and Hanaoka (OTH17) proposed a system using an attribute-based encryption scheme (ABE). ABE is used to restrict the time and location at which a subscriber can obtain the service. However, OTH17 requires a third trusted party (TTP) for key and ciphertext generation; thus, the TTP knows the time and location of the subscriber. This means that the subscriber’s private information is disclosed to the party. Here, we propose a system that avoids disclosure of private data by adding a multi-party computation (MPC). In addition, MPC makes the TTP unnecessary.
AB - In pay-TV services, content is encrypted and transmitted to subscribers. Each subscriber has a security module that holds a decryption key(s) for the encrypted content. A set-top box or a smart card is often used as the security module. When a subscriber wants to obtain the same services outside the home, the subscriber has to bring the security module. However, even if the security module is a card, it is not easy to take it out because of the structure of TV sets and set-top boxes. As a way of improving current pay-TV services, Ogawa, Tamura, and Hanaoka (OTH17) proposed a system using an attribute-based encryption scheme (ABE). ABE is used to restrict the time and location at which a subscriber can obtain the service. However, OTH17 requires a third trusted party (TTP) for key and ciphertext generation; thus, the TTP knows the time and location of the subscriber. This means that the subscriber’s private information is disclosed to the party. Here, we propose a system that avoids disclosure of private data by adding a multi-party computation (MPC). In addition, MPC makes the TTP unnecessary.
UR - http://www.scopus.com/inward/record.url?scp=85069855769&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85069855769&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-22351-9_28
DO - 10.1007/978-3-030-22351-9_28
M3 - Conference contribution
AN - SCOPUS:85069855769
SN - 9783030223502
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 417
EP - 428
BT - HCI for Cybersecurity, Privacy and Trust - 1st International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Proceedings
A2 - Moallem, Abbas
PB - Springer Verlag
T2 - 1st International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, held as part of the 21st International Conference on Human-Computer Interaction, HCI International 2019
Y2 - 26 July 2019 through 31 July 2019
ER -