
(d) Double-spending Impossibility: The license ad-
ministrator can detect illegal prepaid tickets by
verifying the serial number of a prepaid ticket and
the times it has been used. Hence it is possible
to prevent double-spending even if a user uses a
duplicated prepaid ticket.
(e) Anonymity: The license administrator cannot as-
certain the relationship between the user and the
serial number of a prepaid ticket when issuing a
prepaid ticket. The TRM in a receiver (outside)
cannot identify the user since the prepaid ticket
data is encrypted with K
wt
when paying for pre-
paid tickets. In addition, prepaid tickets are peri-
odically summed. This process deletes history of
each user’s viewing content. It is impossible to
extract the user’s individual viewing content from
the summed prepaid ticket value. Hence, it en-
sures anonymity to the license administrator and
the TRM in a receiver (outside). The user can thus
view content anonymously.
(f) Divisibility: The TRM in a receiver can calculate
arbitrary values and issue a new prepaid ticket.
It can detect illegal prepaid tickets, and Double-
spending is impossible, even if a user uses dupli-
cated prepaid tickets before calculation.
(g) Offline: The TRM in a receiver (outside) calcu-
lates the sum total of contents fees for each con-
tent provider. It does not converge on forward-
ing processes since the license administrator col-
lects content fees summed by polling, which de-
termines the schedule itself. Hence, it operates
offline since it is not necessary for the license ad-
ministrator to be connected with the TRM in a re-
ceiver (outside) when the user views content.
5 CONCLUSION
We considered the problems of previously proposed
systems, including lack of perfect anonymity and load
distribution. Our protocol ensures anonymity by us-
ing blind signatures when issuing a prepaid ticket and
it cannot directly identify the relationship between the
user and the serial number when paying for prepaid
tickets. In addition, by attaching a serial number and
the times the ticket has been used to the prepaid ticket
data, it becomes possible to detect illegal acts such as
double-spending. We will develop a software simula-
tor and investigate the management method, including
how to deal with cumulative serial numbers and how
to detect illegal operations when paying for prepaid
tickets.
REFERENCES
ARIB (2005). ARIB STD-B25 Conditional Access System
Specifications for Digital Broadcasting. Association
of Radio Industries and Bussinesses, Tokyo, 4th edi-
tion.
Camenisch, J., Hohenberger, S., and Lysyanskaya, A.
(2005). Compact e-cash. In EUROCRYPT’05, 24th
Annual International Conference on the Theory and
Applications of Cryptographic Techniques. Springer-
Verlag.
Chaum, D. (1982). Blind signatures for untraceable pay-
ments. In CRYPTO’82, 2nd Annual International
Cryptology Conference. Springer-Verlag.
Chaum, D. (1989). Online cash checks. In EURO-
CRYPT’89, Workshop on the Theory and Applications
of Cryptographic Techniques. Springer-Verlag.
Fujisawa, T., Inamura, M., Ogawa, K., Kimura, T., and
Tanaka, T. (2006). Prepaid viewing system for mo-
bile terminal. In WPMC’06, International Sympo-
sium on Wireless Personal Multimedia Communica-
tions. WPMC.
Inamura, M., Tanaka, T., Fujisawa, T., Ogawa, K., and
Kimura, T. (2006). Flexible license transfer system
using mobile terminal. In SECRYPT’06, 1st Interna-
tional Conference on Security and Cryptography. IN-
STICC.
Ogawa, K., Hanaoka, G., and Imai, H. (2005). Extension
of broadcasting service by using electric tokens. In
SCIS’05, Symposium on Cryptography and Informa-
tion Security 2005. SCIS.
Okamoto, T. and Ohta, K. (1992). Universal electronic cash.
In CRYPTO’92, 12th Annual International Cryptol-
ogy Conference. Springer-Verlag.
Shigetomi, R., Otsuka, A., Ogawa, T., and Imai, H. (2003).
Refreshable tokens and its application to anonymous
loan. In SCIS’03, Symposium on Cryptography and
Information Security 2003. SCIS.
Song, R. and Korba, L. (2003). Pay-tv system with strong
privacy and non-repudiation protection. In IEEE
Trans. on Consumer Electronics. IEEE.
SECRYPT 2007 - International Conference on Security and Cryptography
288