2005) has been proposed by IBM, and is based on
broadcast encryption. This is great improvement
from an economical point of view. However the P2P
model are not well suitable for the home network. In
home network there are always
administrators-parents.
The Philips patents WO2004027588 (Philips
patent WO2004027588, 2005) is based on the idea
that an authorized domain is set up with a central
device administering the network. When a device
enters the network, the central device registers the
entering device and issues a domain certificate to the
entering device. This invention designs a certificate
chain, illustrated in Fig. 1, contains the following
certificates:
The (external) Certificate Authority (CA) root
certificate, self-signed and is used to sign
device certificates.
The device certificate, signed by the CA root
private key and containing the device public
key.
The AD root certificate, which is generated by
the ADM (AD Manager) at AD setup and
which signs a new key pair.
The private key corresponding to this
certificate will be used to issue AD device
certificates.
The AD device certificate, issued by the ADM
when the device joins an AD.
Figure1: Certificate Chain (Redrawn from (Philips patent
WO2004027588, 2005)).
Philips’ scheme is suitable for today’s digital
home, which is centralized in management but
distributed in location. And the public key
encryption is also more popular than broadcast
encryption in today’s consuming devices.
3 THE AUTHENTICATION
PROTOCOL ON CONTENT
DEMANDING
Figure 2: Home network System (Redrawn from (Philips
patent WO2004027588, 2005))
Fig.2 shows an in-home network system 100
comprising devices 101-105 interconnected via a
network 110. In this system a set top box 101 is the
central administrating device, providing central
control over the others.
When the portable device 103 demands content
from content provider 201, the device 103 should
show the content provider 201 not only its device
certificate, which is issued by device manufacturer
(CA Root), but also its AD device certificate. Since
the certificate is in chain and the content provider
only trusts the CA Root, the device 103 should show
content server 201 the device’s AD device certificate,
AD Root Certificate and the ADM’s certificate. And
the content provider 201 verifies all the certificates
in turn. The certificate chain makes much
complexity in authentication.
We notice that the certificate chain could be
expressed by proxy signature. So we try to use proxy
signature to simplify the authentication.
There’re many paper about proxy signature, the
primary schemes are (Mambo et al., 1996 a)
(Mambo et al., 1996 b)(Usuda et al., 1996) (Kim et
al., 1997) (Jiguo, 2002).
M-U-O proxy signature schemes (Mambo et al.,
1996 a) (Mambo et al., 1996 b)are the first two
schemes of proxy signature but donnot provide
nonrepudiation. It is impossible to decide who is the
actual signer of a proxy signature in their schemes.
Another drawback of these schemes is that they
require a secure channel to transmit the proxy
signature key from the original signer to the proxy
signer. Anyone who can intercept this proxy
signature key can impersonate the proxy signer.
(Usuda et al., 1996) (Kim et al., 1997) (Jiguo,
2002) give some improvement to M-U-O’s scheme.
ICETE 2005 - MULTIMEDIA SIGNAL PROCESSING
192