The present invention generally relates to an authentication method employing Elliptic Curve Cryptography (ECC), applicable to mobile broadcast TV systems, mobile pay-TV systems or mobile pay-per-view systems.
Mobile broadcast TV has been developed actively in the recent years, and so as the related technologies. With the gradual integration of heterogeneous networks, the convergence service becomes a very important trend. Mobile broadcast TV service is an important service era of the convergence service. In the convergence service, pay service plays an important role of the mobile broadcast TV service.
Digital Video Broadcast (DVB) consortium has been actively promoting mobile broadcast service in the recent years. Mobile TV on broadcasting network is an important approach for mobile services. In DVB, the standard of mobile broadcast TV is defined in DVB-H. At present, mobile broadcast TV has several campuses under active development, which include DVB-H, MediaFLO, ISDB-T, T-DMB.
Mobile broadcast TV is a development which may provide a convergence service of broadcast and telecommunication services. To provide mobile service, DVB-H defines additional features in physical layer from existing terrestrial DVB-T, where one of the features is to process handoff/handover issue. In addition, DVB-H also applies Internet Protocol (IP) to provide multimedia service.
In the terrestrial TV, an illegal TV station may easily use the same frequency to forge an illegal TV station which causes legal TV a grave operation loss. An attacker may also easily and cheaply use the same frequency to forge an illegal TV station or transmitter attacking a legal TV station. Also, without proper and secure authentication mechanism, an impersonation subscriber may steal a service. These security problems also exist in the pay service for mobile broadcast TV. Therefore, a mutual authentication mechanism for pay service of mobile broadcast TV becomes an important mechanism.
Anonymity is an important privacy issue in protecting user information and identification to prevent abuse by unauthorized users. With the actively development of broadcast TV and the convergence of heterogeneous networks, diverse services such as pay-TV, Impulse Pay-Per-View (IPPV), VOD, multimedia services, on-line game, may be provided to the subscribers. The anonymous authentication of mobile broadcast TV also becomes an important security issue. Anonymous identity-based cryptography has been widely applied to network and communication systems.
Authentication is a security mechanism used to identify the subscribers and the legal users. The early pay TV uses a conditional access system (CAS) to operate the service access management through subscriber authentication. In a pay TV system, CAS manages a large amount of authorized subscribers. The CAS employs the entitlement message to manage the authorized subscribers and services. The CAS handle the security of the entitlement and authentication by the entitlement message allocated to subscribers. The entitlement message carries access parameters with authentication information in order to manage the service access.
Because the bandwidth of broadcast is very precious, the efficient utilization of bandwidth to achieve the broadcast efficiency in pay-TV or near-VOD is an important job. In general, the following scenarios may occur in pay-TV. A plurality of users request the same service and the same service arrives at the head end system of CAS in a short period of time or simultaneously. In order to achieve the broadcast efficiency, the service scheduling and program scheduling are necessary and important tasks. Also, efficient use of bandwidth is also important in the service or program scheduling. To achieve efficient handling, the CAS needs to schedule the entitlement messages for the arriving requests.
The early CAS uses a public key cryptosystem or symmetric key cryptosystem to manage the service security. The CAS using the public key cryptosystem uses digital signatures to authenticate the subscribers. The CAS using the symmetric key cryptosystem, such as DES or AES, uses shared secret keys to authenticate the subscribers, but fails to reach the non-repudiation protection. However, in the situation of multiple service operations, the symmetric key technique may suffer insecure risk and fail to reach the non-repudiation protection.
For example, Song et. al. disclosed an E-ticket scheme for pay-TV systems. The E-ticket scheme may achieve the privacy and non-repudiation protection for pay-TV systems. The scheme is based on RSA public key cryptography, and employs an encrypted authentication message with digital signature to execute mutual authentication. This scheme also supports anonymity. Lee et. al. also disclosed related schemes. These techniques all use one-to-one authentication message delivery without proposing an effective measure for the scenario when a plurality of users requesting the same service which arrives at the CAS head end system simultaneously or in a short period of time.
In recent years, the elliptic curve cryptography (ECC) becomes more efficient in same security level, or called key length, than the integer factoring scheme. The pairing technology applied to elliptic curve research has also been disclosed, such as Weil Pairing, Tate Pairing, and so on. These pairing technologies may be applied to encryption, digital signature and authenticated key agreement, and so on. For example, the bilinear pairing technology is applied to the supersingular elliptic curve, bilinear Diffe-Hellman problem, and discrete logarithm problem.
The following describes the technical terminologies and definitions used in ECC. Mathematically, ECC is defined on the finite algebraic structure. To simplify the description, the elliptic curve in the following description is defined on the finite algebraic structure Fp, where characteristic p>3. Elliptic curve E defined on Fp may be simplified as the following form: E: y2=x3+ax+b, where a·bεFp(p>3), and 4a3+27b2≠0. The points on elliptic curve E form a group and the group includes a point at infinity, depicted as O. According to the group definition, any point P of elliptic curve E must satisfy P+(−P)=O. The elliptic curve group is an additive group.
Assume that line l passes two different points P and Q of elliptic curve E. Line l and elliptic curve E intersects at a third point −R, and P+Q=R. If line l is tangent to elliptic curve E, P+P=2P. Generally, point multiplication is defined as Q=kP, where k is an integer. A famous problem, called elliptic curve discrete logarithm problem (ECDLP), is that it is difficult to find an integer k so that Q=kP for a given point Q on elliptic curve E. Many security technologies based on ECC are proposed according to ECDLP. The bilinear pairing technique is a nice scheme to realize the identity-based cryptography. The bilinear pairing technology is a mapping to map a subgroup of points on an elliptic curve to subgroup of elements in a finite field.
The disclosed exemplary embodiments according to the present invention may provide an authentication method based on elliptic curve cryptography (ECC), applicable to a mobile broadcast TV systems, mobile pay-TV systems or mobile pay-per-view systems. The mobile broadcast TV system at least includes one or more head end systems, at least a transmitter, and at least a mobile set.
In an exemplary embodiment, the disclosed is directed to an authentication method based on ECC. The authentication method comprises: one or more request messages from mobile sets simultaneously or in a short period of time arriving at a head end system for authentication; computing each broadcast authentication message by ECC; computing each service request message by ECC and pairing operation; constructing a mutual authentication between the head end system and mobile sets by ECC and pairing operation; and broadcasting one group of authentication messages to all the mobile sets of many requests arriving at the head end system simultaneously or in a short period of time for the same service.
The above disclosed exemplary embodiments employ the point addition of ECC and bilinear pairing to the authentication parameters so as to achieve the one-to-many authentication message broadcast.
The foregoing and other features, aspects and advantages of the present invention will become better understood from a careful reading of a detailed description provided herein below with appropriate reference to the accompanying drawings.
The disclosed embodiments of the present invention provide a one-to-many authentication message broadcast, and take into account the that scenario that a plurality of users' requests arrive at the head end system simultaneously or in a short period of time for the same service. The subscribers to the pay service of mobile broadcast TV may anonymously authenticate whether the head end system is genuine.
The present invention employs ECC and pairing operation to realize the mobile broadcast TV authentication, and the authentication has the efficient broadcast effect. Through ECC and pairing operations, the efficient broadcast of authentication messages may also be obtained. Besides, through the use of pairing operation and ECC, the attacks from man-in-the-middle or forgeries may also be resisted.
The following describes the technical terminologies, definitions and features of the bilinear pairing operation related to the present invention. Let elliptic curve E be defined over the finite algebraic structure Fp, there exists an isomorphism between a set of certain points on E to a subgroup on Fp. Assume that #E is the number of points in E over Fp. Let n be a prime number such the n|#E, and n and the characteristic p of Fp are mutually prime. E has points of order n; i.e., the point PεE satisfying the equation nP=O, P≠O. Point P is called the generator of the subgroup of E over Fp, and P has an order of n.
Let G1 be a cyclic additive group with a generator P and an order of prime number q, and G2 be a multiplicative group with an order of q. Assume that the discrete logarithm problem in both G1 and G2 is hard to solve. Typically, G1 is a subgroup of a point set on E and G2 is a subgroup of Fp. Let ê be a bilinear mapping, i.e., ê: G1×G1→G2, satisfying and the following three conditions:
The following describes how the present invention employs ECC and pairing operation, and is applicable to the mobile broadcast TV systems, mobile pay-TV systems or mobile pay-per-view systems.
Head end system 110, such as a system for handling audio/video or multimedia service, has a power processor. A transmitter may be a base station carrying and transmitting wireless signals to mobile sets. A mobile set is a user device requesting services. The mobile broadcast TV system uses 3G/Universal Mobile Telecommunications System (UMTS) or Global System for Mobile Communication (GSM) as a return channel. The return channel is connected to the head end system for providing interactive service.
Whenever a user requests a service, the corresponding mobile set must transmit messages to head end system 110. The message consists of authentication and the service request for user authentication. When head end system 110 authenticates that the mobile set is legal, the head end system will broadcast the authentication information to each mobile set. After the mobile set confirms that the head end system is genuine, the mobile set may obtain the service.
When a mobile set moves to a coverage area of a new transmitter, known as hand-off, the mobile set has to perform a re-authentication. To provide efficient processing, assume that an authentication server 140 with a service scheduler needs to do a scheduling for the arriving authentication request messages to head end system 110.
Refer to both
There may exist requests from a plurality of mobile sets arriving at the head end system simultaneously or in a short period of time, and among these requests some may request the same service to the head end system. For example, m users ur1, ur2, ur3, . . . , urm requesting the same service arrive at the head end system for authentication. In the disclosed exemplary embodiment according to the present invention, the authentication process of these m users ur1, ur2, ur3, . . . , urm requesting the same service is called one authentication process, with the same service depicted as V. In other words, for the requests of the same service, an authentication broadcast message is broadcasted to all the corresponding requesting mobile sets, shown as label 155 of
The following defines the symbols for describing the present invention.
The authentication method based on ECC of the present invention may include four phases: the initialization phase, the issue phase, the subscription phase and the hand-off authentication. With the aforementioned symbol definitions, the following describes the execution of each phase.
In the initialization phase, the head end system is responsible for the public and private information of all the entities. The head end system has to generate a plurality of parameters to construct a secure communication system. It shows a schematic view of an exemplary operation of a head end system in the initialization phase, consistent with certain disclosed embodiments of the present invention.
Referring to
When a mobile user requests services, the authentication method enters the issue phase. In the execution of the issue phase, the mobile set issues a service set-up request to launch an execution of mutual authentication.
Referring to the exemplary operation of
In step 330, the head end system performs sub-steps 331a, 331b, 332a, and 332b for the request of each user i of the m users. Sub-step 331a is to decrypt authentication parameter idi and check its legitimacy, for example, by employing ECC to decrypt authentication parameter idi. Sub-step 331b is to authenticate the legitimacy of the i-th mobile set, for example, by employing pairing operation to check whether the equation ê(Ci, PHs)=ê(QI, PKs)·ê(QH, Xi) holds. If the equation holds, the head end system will accept that the i-th mobile set is legitimate, i.e., genuine; otherwise, the head end system rejects the authentication. This is reasonable because PKs=kh·x·PIs=kh·x·ks·s·P=ks, s·kh·x·P=ks·s·PHs, which is the share secret between the head end system and the i-th user.
Sub-step 332a is to encrypt authentication parameter Yi with secret value kh, and x, for example, by employing ECC to compute Yi=kh·x·QI. In sub-step 332b, the head end system employs the point addition of ECC on authentication parameter Yi of each of the m users and public key QI of each user to compute YG and QG of one group of authentication parameters, for example, by employing ECC to sum up authentication parameter Yi of each of the m users and public key QI of each user, i.e.,
and treat YG and QG as one group of authentication parameters. In other words, the head end system provides the pairing bilinear operation to the mobile set through the iterative point addition of ECC to improve the broadcast effect.
After all the m users finish the above sub-steps, step 340 is executed. In step 340, the head end system computes authentication message {YG, QG, θ} by a mapping between the same service V and a ticket identity θ of the same service V, and broadcasts the authentication message {YG, QG, θ} to the m users requesting the same service V. The head end system may employ the pairing from ECC to compute the ticket identity θ, for example, by first computing the service ticket α of the requested service V of the m users, α=H2(V, YG), then performing pairing with QG to compute θ, θ=ê(PHs, QG)⊕α, where H2 is a one-way hash function.
In step 350, the mobile set corresponding to the i-th user receives authentication message {YG, QG, θ}, performs authentication of the head end system and computes the ticket identity of the i-th user. The mobile set may authenticate the head end system through verifying whether the equation ê(YG, ks·s·P)=ê(QG, PKs) holds or not. If the equation holds, the mobile set of the i-th user accepts that the head end system is legitimate, i.e., genuine; otherwise, rejects the authentication and terminates the service process. This is correct, proven as follows:
where PKs=ks·s·PHs=ks·s·kh·x·P=kh·x·ks·s·P=kh·x·PIs.
Besides, the mobile set may compute the i-th service θi by the equation θi=θ·ê(PHs, (QG+(−QI)))−1, and store the service θi. This is correct, proven as follows:
Then, ê(PHs, QG)⊕α=(ê(PHs, QI)⊕α)·ê(PHs, (QG−QI))
and θ=θi·ê(PHs, (QG−QI));
therefore, θi=θ·ê(PHs, (QG+(−QI)))−1
After the head end system finishes step 340, the head end system may choose a secret to compute a new authentication public key PHs for the next authentication process, as shown in step 360. For example, by choosing a new secret value kh to compute new the authentication public key PHs=kh·PAH.
Following the above disclosed, the present invention may also prove the following items.
is an encrypted value. QG is computed by
and θ is computed through pairing operation θ=ê(PHs, QG)⊕α; therefore, no information regarding identity IDI is exposed in message {YG, QG, θ}. So, it is difficult for the adversary to solve identity IDI with the hash function security.
When the valid message is received, the handheld user may use the ticket identity to subscribe some services. When the user tries to subscribe a certain service V, the user has to perform the communication protocol of the subscription phase.
Referring to
In sub-step 420a, if the equation from pairing operation is confirmed, the user issuing the subscription message is genuine. In sub-step 420b, if the equation from pairing operation is confirmed, the user obtains a service right.
In loop procedure 420, head end system 110 may employ the following operations on elliptic curve E to manipulate authentication parameters Yi and QI into YG and QG, and manipulate purchase identity α into λG.
Yi=kh·x·QI
YG=YG+Yi
QG=QG+QI
λG=λG+α
In other words, head end system 110 employs the iterative point additions of authentication parameters Yi and QI and purchase identity α, and the computation of γG=ê(PHs, QG)⊕λG to produce an authentication message {YG, QG, γG}, as shown in sub-step 420c. In step 430, the authentication message {YG, QG, γG} is broadcasted to the mobile sets.
The mobile set may re-authenticate head end system 110 through the confirmation of the equation ê(YG, ks·s·P)=ê(QG, PKs) from pairing operation, as shown in step 440. If the equation is confirmed, the re-authenticated head end system 110 is genuine.
If the equation ê(YG, ks·s·P)=ê(QG, PKs) is confirmed, the mobile set may generate respective authorization key γi through the equation γi=γG·ê(PHs, (QG+(−QI)))−1, as shown in step 450. In other words, the mobile set may derive respective authorization key γi through the iterative additions and the pairing operations of the authentication parameters. Then, the mobile set may obtain the service by the respective authorization key γi and its private key.
When the mobile set moves to a coverage area of a different transmitter, a hand-off occurs and the mobile set has to perform the re-authentication communication protocol. In a hand-off, a forged transmitter or TV station may forge as a genuine transmitter or TV station.
Referring to
In sub-step 531a, head end system 110 authenticates the i-th mobile set, such as by restoring QI, PHs, α of i-th mobile set and verifies whether the equation ê(Ci, PHs)=ê(QI, PKs)·ê(QH, Xi) from pairing operation holds. In sub-step 531b, head end system 110 verifies the legitimacy of the ticket ID θi, such as by checking whether the equation θi=ê(PHs, QI)⊕α from pairing operation holds.
In sub-step 532a, the ECC may be applied to encrypt authentication parameter Yi with secret value kh and x, such as Yi=kh·x·QI. In sub-step 532b, for authentication parameter Yi of each of the m users and public key QI of each user, the head end system employs the point addition of ECC to compute a group of authentication parameters YG and QG, such as by employing ECC to sum up authentication parameter Yi of each of the m users and to sum up public key QI of each user.
In step 540, head end system 110 broadcasts authentication message {YG, QG} to the m users. In step 550, the mobile set receives authentication message {YG, QG} and authenticates head end system 110, such as, by checking whether the equation ê(YG, ks·s·P)=ê(QG, PKs) from pairing operation holds.
The above disclosed embodiments of the present invention may provide a secure authentication protocol to resist attacks, such as attacks from man-in-the-middle, attacks from forgers or attacks of replay in E-AEP. The following proves how the present invention resists the attacks.
(1) Resists attacks from forgers: Without knowing secret value ks, an attacker cannot forge a valid message {idi, Pi, Ci, PIs, Xi, V}. If the attacker tries to crack secret value ks to forge PIs and Xi, the attacker will face the discrete logarithm problem in bilinear pairing operation, i.e., PIs=ks·PAI and Xi=ks·PHs. If the attacker tries to crack secret value ks to forge a Ci, the attacker will also face a discrete logarithm problem in bilinear pairing operation, i.e., Ci=ks·PI+ks·QH. On the way from the head end system to the mobile set, without knowing secret values kh and ks, the attacker cannot forge a valid message {YG, QG, θ}. If the attacker tries to crack secret value kh to forge YG, the attacker will face a discrete logarithm problem in bilinear pairing operation, i.e.,
If an attacker tries to crack secret value ks to forge PIs, the attacker will face a discrete logarithm problem in bilinear pairing operation, i.e., PIs=ks·PAI. Because of the hash function security, it is difficult for the attacker to forge QG as
If an attacker tries to forge θ as θ=ê(PHs, QG)⊕α, the attacker has to know the valid value of ê(PHs, QG) and α. Also, without knowing s, x, ks and kh, the attacker cannot forge θ. Because of the hash function security, it is difficult for the attacker to forge α as α=H2(V, YG).
(2) Resists attacks from man-in-the-middle: Because the head end system and the mobile set shares secret value PKs. The head end system computes PKs=kh·x·PIs=kh·x·ks·PAI=kh·x·ks·s·P through the equation PKs=kh·x·PIs. Without knowing ks and kh, the attacker cannot forge valid PKs. If the attacker forges {idi, Pi, Ci, PIs, Xi, V} without knowing secret value ks, the head end system will identify that ê(Ci, PHs)≠ê(QI, PKs)·ê(QH, Xi). That is, the equation does not hold. This is because the attacker does not have the share secret value PKs. The head end system will reject authentication and terminate the service process. On the other hand, the mobile set compute PKs=ks·s·PHs=ks·x·kh·PAH=ks·s·kh·x·P through the equation PKs=ks·s·PHs. If the attacker does not know secret value kh and x, and forges {YG, QG, θ}, the mobile set will identify that the equation ê(YG, ks·s·P)=ê(QG, PKs) does not holds. The mobile set will reject authentication and terminate the service process.
(3) Resists attacks of replay: To resist the attacks of replay, an exemplary easy way is to embed timestamps into the authentication message. However, time synchronization is required for the timestamp scheme. In the present invention, because secret value kh of each authentication process is randomly chosen by the head end system, {idi, Pi, Ci, PIs, Xi, V} message is random and may be randomly changed. Similarly, secret value ks of each authentication process is randomly chosen, and {YG, QG, θ} message is random and may be randomly changed. Therefore, the present invention may greatly reduce the possibility of attacks of replay.
As shown in the exemplary comparison and analysis of
In the exemplary comparison and analysis in
In the issuing phase, it may be seen from
When m requests to the same service arrive simultaneously or in a short period of time, the disclosed embodiments according to the present invention only requires for broadcasting a message by the head end system in an authentication process. While in Song's method, m messages are required. Therefore, the present invention may provide an efficient method for message broadcast to the mobile sets.
In summary, the disclosed exemplary embodiments of the present invention may provide an authentication method from ECC. In the case that m requests arrive the head end system simultaneously or in a short period of time, the authentication method only employs an authentication broadcast message by the pairing operation to achieve effective broadcasting of authentication messages and performs better in terms of both communication cost and computational cost. The authentication method employs ECC and has inherited the high security and small key size of the ECC so as to achieve the mutual authentication between the head end system and the mobile set, as well as provide anonymous service. The authentication method may resist the attacks from man-in-the-middle and forgers, and reduce the attach probability from the replay.
Although the present invention has been described with reference to the exemplary embodiments, it will be understood that the invention is not limited to the details described thereof. Various substitutions and modifications have been suggested in the foregoing description, and others will occur to those of ordinary skill in the art. Therefore, all such substitutions and modifications are intended to be embraced within the scope of the invention as defined in the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
97105431 A | Feb 2008 | TW | national |
Number | Name | Date | Kind |
---|---|---|---|
5406628 | Beller et al. | Apr 1995 | A |
6356937 | Montville et al. | Mar 2002 | B1 |
6618483 | Vanstone et al. | Sep 2003 | B1 |
6876747 | Faccin et al. | Apr 2005 | B1 |
7072865 | Akiyama | Jul 2006 | B2 |
7123721 | Panjwani et al. | Oct 2006 | B2 |
7167860 | Black et al. | Jan 2007 | B1 |
7921292 | Pauker et al. | Apr 2011 | B1 |
7929688 | Yamamichi et al. | Apr 2011 | B2 |
20020026581 | Matsuyama et al. | Feb 2002 | A1 |
20020146125 | Eskicioglu et al. | Oct 2002 | A1 |
20030031322 | Beckmann et al. | Feb 2003 | A1 |
20030051251 | Sugimoto et al. | Mar 2003 | A1 |
20030087629 | Juitt et al. | May 2003 | A1 |
20040006697 | Noyama et al. | Jan 2004 | A1 |
20050050333 | Yeap et al. | Mar 2005 | A1 |
20050113068 | Hoffmann | May 2005 | A1 |
20050144634 | Koo et al. | Jun 2005 | A1 |
20050177741 | Chen et al. | Aug 2005 | A1 |
20060123238 | Kacker et al. | Jun 2006 | A1 |
20060205388 | Semple et al. | Sep 2006 | A1 |
20060218400 | Kimmel et al. | Sep 2006 | A1 |
20070104097 | Rassool et al. | May 2007 | A1 |
20070165843 | Lauter et al. | Jul 2007 | A1 |
20070248224 | Buskey et al. | Oct 2007 | A1 |
20080130895 | Jueneman et al. | Jun 2008 | A1 |
20080148047 | Appenzeller et al. | Jun 2008 | A1 |
20090063851 | Nijdam | Mar 2009 | A1 |
Number | Date | Country | |
---|---|---|---|
20090180612 A1 | Jul 2009 | US |