Application authentication for hybrid services of broadcasting and communications networks

4Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Broadcasting and communications networks can be used together to offer hybrid broadcasting services that incorporate a variety of personalized information from communications networks in TV programs. To enable these services, many different applications have to be run on a user terminal, and it is necessary to establish an environment where any service provider can create applications and distribute them to users. The danger is that malicious service providers might distribute applications which may cause user terminals to take undesirable actions. To prevent such applications from being distributed, we propose an application authentication protocol for hybrid broadcasting and communications services. Concretely, we modify a key-insulated signature scheme and apply it to this protocol. In the protocol, a broadcaster distributes a signing key to a service provider that the broadcaster trusts. As a result, users can verify that an application is reliable. If a signed application causes an undesirable action, a broadcaster can revoke the privileges and permissions of the service provider. In addition, it can update the signing key. That is, our protocol is secure against leakage of the signing key by the broadcaster. Moreover, a user terminal uses only one verification key for verifying a signature, so the memory needed for storing the verification key in the user terminal's is very small. With our protocol, users can securely receive hybrid services from broadcasting and communications networks. © 2012 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Ohtake, G., & Ogawa, K. (2012). Application authentication for hybrid services of broadcasting and communications networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7115 LNCS, pp. 171–186). https://doi.org/10.1007/978-3-642-27890-7_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free