{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T11:01:19Z","timestamp":1774436479466,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T00:00:00Z","timestamp":1591574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T00:00:00Z","timestamp":1591574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-08904-8","type":"journal-article","created":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T15:10:50Z","timestamp":1591629050000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":68,"title":["A Computationally Efficient and Scalable Key Management Scheme for Access Control of Media Delivery in Digital Pay-TV Systems"],"prefix":"10.1007","volume":"80","author":[{"given":"Vinod","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Rajendra","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"S. K.","family":"Pandey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,8]]},"reference":[{"issue":"1","key":"8904_CR1","first-page":"112","volume":"19","author":"SM Chen","year":"2017","unstructured":"Chen SM, Yang CY, Hwang MS (2017) Using a new structure in group key management for pay-TV. International Journal of Network Security 19(1):112\u2013117","journal-title":"International Journal of Network Security"},{"issue":"1","key":"8904_CR2","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s11042-014-2296-4","volume":"75","author":"MS Farash","year":"2016","unstructured":"Farash MS, Attari MA (2016) A provably secure and efficient authentication scheme for access control in mobile pay-TV systems. Multimed Tool Appl 75(1):405\u2013424","journal-title":"Multimed Tool Appl"},{"key":"8904_CR3","doi-asserted-by":"publisher","unstructured":"He D, Kumar N, Shen H, Lee JH (2016) One-to-many authentication for access control in mobile pay-tv systems. Sci China Inf Sci 59. https:\/\/doi.org\/10.1007\/s11432-015-5469-5","DOI":"10.1007\/s11432-015-5469-5"},{"issue":"5","key":"8904_CR4","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TMM.2004.834861","volume":"6","author":"Y-L Huang","year":"2004","unstructured":"Huang Y-L, Shieh S, Ho F-S, Wang J-C (Oct. 2004) Efficient key distribution schemes for secure media delivery in pay-TV systems. in IEEE Transactions on Multimedia 6(5):760\u2013769. https:\/\/doi.org\/10.1109\/TMM.2004.834861","journal-title":"in IEEE Transactions on Multimedia"},{"key":"8904_CR5","doi-asserted-by":"publisher","unstructured":"Je DH, Kim H-S, Choi Y-H, Seo SW (2014) Dynamic configuration of batch rekeying interval for secure multicast service, 2014 International Conference on Computing, Networking and communications (ICNC), Honolulu, HI, pp. 26\u201330. doi: https:\/\/doi.org\/10.1109\/ICCNC.2014.6785299.","DOI":"10.1109\/ICCNC.2014.6785299"},{"key":"8904_CR6","doi-asserted-by":"crossref","unstructured":"Joshi MY, Bichkar RS (2013) Scalable Key Transport Protocol Using Chinese Remainder Theorem\u2016, The Proceedings of International symposium on Security in Computers and Communications (SSCC), Mysore, pp 397\u2013402","DOI":"10.1007\/978-3-642-40576-1_39"},{"issue":"4","key":"8904_CR7","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TMM.2010.2046362","volume":"12","author":"J Kim","year":"2010","unstructured":"Kim J, Choi H (June 2010) Improvements on Sun 's conditional access system in pay-TV broadcasting systems. in IEEE Transactions on Multimedia 12(4):337\u2013340. https:\/\/doi.org\/10.1109\/TMM.2010.2046362","journal-title":"in IEEE Transactions on Multimedia"},{"key":"8904_CR8","doi-asserted-by":"publisher","unstructured":"Kumar V, Kumar R, Pandey SK, An Enhanced and Secured RSA Public Key Cryptosystem Algorithm Using Chinese Remainder Theorem, third International Conference, NGCT 2017, Smart and Innovative Trends in Next Generation Computing Technologies, Communications in Computer and Information Science(CCIS), pp. 1\u201312, doi: https:\/\/doi.org\/10.1007\/978-981-10-8660-1_42.","DOI":"10.1007\/978-981-10-8660-1_42"},{"key":"8904_CR9","doi-asserted-by":"publisher","unstructured":"Kumar V, Kumar R, Pandey SK (2018) A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem. Journal of King Saud University \u2013 Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2017.12.014","DOI":"10.1016\/j.jksuci.2017.12.014"},{"key":"8904_CR10","doi-asserted-by":"publisher","unstructured":"Kumar V, Kumar R, Pandey SK (2018) Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups, International Journal of Information Technology pp 1\u20136, doi:https:\/\/doi.org\/10.1007\/s41870-018-0140-1.","DOI":"10.1007\/s41870-018-0140-1"},{"key":"8904_CR11","doi-asserted-by":"publisher","unstructured":"Kumar V, Kumar R, Pandey SK, Alam M Fully homomorphic encryption scheme with probabilistic encryption based on euler\u2019s theorem and application in cloud computing. In: Aggarwal, V.B., Bhatnagar, V., Mishra, D.K. (eds.) Big Data Analytics. AISC, vol. 654, pp. 605\u2013611. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-6620-7_58.","DOI":"10.1007\/978-981-10-6620-7_58"},{"key":"8904_CR12","doi-asserted-by":"publisher","unstructured":"Kumar V, Kumar R, Pandey SK (2020) An Efficient and Scalable Distributed Key Management Scheme Using Ternary Tree for Secure Communication in Dynamic Groups. In: Singh P., Panigrahi B., Suryadevara N., Sharma S., Singh A. (eds) Proceedings of ICETIT 2019. Lecture notes in electrical engineering, vol 605. Springer, Cham doi: https:\/\/doi.org\/10.1007\/978-3-030-30577-2_13","DOI":"10.1007\/978-3-030-30577-2_13"},{"issue":"3","key":"8904_CR13","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/4234.991148","volume":"6","author":"M Li","year":"2002","unstructured":"Li M, Poovendran R, Berenstein C (2002) Design of Secure Multicast key Management Schemes with communication budget constraint. IEEE communication letters 6(3):108\u2013110. https:\/\/doi.org\/10.1109\/4234.991148","journal-title":"IEEE communication letters"},{"issue":"7","key":"8904_CR14","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1093\/comjnl\/bxp060","volume":"53","author":"I-C Lin","year":"2010","unstructured":"Lin I-C, Tang S-S, Wang C-M (September 2010) Multicast key management without rekeying processes. Comput J 53(7):939\u2013950","journal-title":"Comput J"},{"key":"8904_CR15","doi-asserted-by":"publisher","unstructured":"Z. Liu, Y. Lai, X. Ren and S. Bu (2012) An Efficient LKH Tree Balancing Algorithm for Group Key Management, 2012 International conference on control engineering and communication technology, Liaoning, pp.1003\u20131005. doi: https:\/\/doi.org\/10.1109\/ICCECT.2012.213.","DOI":"10.1109\/ICCECT.2012.213"},{"issue":"5","key":"8904_CR16","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","volume":"29","author":"DA McGrew","year":"2003","unstructured":"McGrew DA, Sherman AT (2003) Key establishment in large dynamic groups using one-way function trees. IEEE Trans Softw Eng 29(5):444\u2013458","journal-title":"IEEE Trans Softw Eng"},{"key":"8904_CR17","unstructured":"Naranjo JAM, Lopez-Ramos JA, Casado LG (2010) Applications of the extended Euclidean algorithm to privacy and secure communications, in: proceedings of the 10th international conference on computational and mathematical methods in science and engineering, CMMSE"},{"key":"8904_CR18","doi-asserted-by":"publisher","first-page":"18835","DOI":"10.1007\/s11042-019-7257-5","volume":"78","author":"O Pal","year":"2019","unstructured":"Pal O, Alam B (2019) Efficient and secure conditional access system for pay-TV systems. Multimed Tools Appl 78:18835\u201318853. https:\/\/doi.org\/10.1007\/s11042-019-7257-5","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"8904_CR19","doi-asserted-by":"publisher","first-page":"951","DOI":"10.3844\/jcssp.2012.951.956","volume":"8","author":"K Saravanan","year":"2012","unstructured":"Saravanan K, Purusothaman T (2012) Efficient star topology based multicast key management algorithm. J Comput Sci 8(6):951\u2013956","journal-title":"J Comput Sci"},{"issue":"6","key":"8904_CR20","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TMM.2008.2001381","volume":"10","author":"HM Sun","year":"2008","unstructured":"Sun HM, Chen CM, Shieh CZ (2008) Flexible-pay-per-channel: a new model for content access control in pay-TV broadcasting systems. IEEE Trans Multimed 10(6):1109\u20131120","journal-title":"IEEE Trans Multimed"},{"issue":"12","key":"8904_CR21","doi-asserted-by":"publisher","first-page":"3253","DOI":"10.1109\/TPDS.2013.2297917","volume":"25","author":"S Tang","year":"2014","unstructured":"Tang S, Xu L, Liu N, Huang X, Ding J, Yang Z (Dec. 2014) Provably secure group key management approach based upon hyper-sphere. in IEEE Transactions on Parallel and Distributed Systems 25(12):3253\u20133263. https:\/\/doi.org\/10.1109\/TPDS.2013.2297917","journal-title":"in IEEE Transactions on Parallel and Distributed Systems"},{"issue":"9","key":"8904_CR22","doi-asserted-by":"publisher","first-page":"2899","DOI":"10.1007\/s11042-013-1753-9","volume":"74","author":"R Varalakshmi","year":"2013","unstructured":"Varalakshmi R, Rhymend Uthariaraj V (2013) Huffman based conditional access system for key distribution in digital. TV multicast Multimed Tools Appl 74(9):2899\u20132912. https:\/\/doi.org\/10.1007\/s11042-013-1753-9","journal-title":"TV multicast Multimed Tools Appl"},{"key":"8904_CR23","doi-asserted-by":"publisher","unstructured":"Vijaya Kumar P, Bose S, Kannan A (2013) Centralized Key Distribution Protocol using the Greatest Common Divisor Method, Computers & Mathematics with Applications, 2013 Volume 65, Issue 9. Pages: 1360\u20131368, doi:https:\/\/doi.org\/10.1016\/j.camwa.2012.01.038.","DOI":"10.1016\/j.camwa.2012.01.038"},{"issue":"1\u20134","key":"8904_CR24","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s13119-011-0001-8","volume":"1","author":"P VijayaKumar","year":"2012","unstructured":"VijayaKumar P, Bose S, Kannan A (2012) Rotation based secure multicast key management for batch rekeying operations. Netw Sci 1(1\u20134):39\u201347","journal-title":"Netw Sci"},{"issue":"3","key":"8904_CR25","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1049\/iet-ifs.2012.0352","volume":"8","author":"P VijayaKumar","year":"2014","unstructured":"VijayaKumar P, Bose S, Kannan A (2014) Chinese remainder theorem based centralized group key management for secure muticast communication. IET Inf Secur 8(3):179\u2013187. https:\/\/doi.org\/10.1049\/iet-ifs.2012.0352","journal-title":"IET Inf Secur"},{"key":"8904_CR26","doi-asserted-by":"publisher","unstructured":"Vijayakumar P, Naresh R, Islam SK, Deborah LJ (2016) An effective key distribution for secure internet pay-TV using access key hierarchies. J Secur Commun Netw. https:\/\/doi.org\/10.1002\/sec.1680","DOI":"10.1002\/sec.1680"},{"issue":"4","key":"8904_CR27","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1049\/iet-ifs.2011.0281","volume":"6","author":"H Wang","year":"2012","unstructured":"Wang H, Qin B (Dec. 2012) Improved one-to-many authentication scheme for access control in pay-TV systems. in IET Information Security 6(4):281\u2013290. https:\/\/doi.org\/10.1049\/iet-ifs.2011.0281","journal-title":"in IET Information Security"},{"issue":"6","key":"8904_CR28","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1109\/TMM.2012.2199290","volume":"14","author":"L Yeh","year":"2012","unstructured":"Yeh L, Tsaur W (2012) A secure and efficient authentication scheme for access control in Mobile pay-TV systems. in IEEE Transactions on Multimedia 14(6):1690\u20131693. https:\/\/doi.org\/10.1109\/TMM.2012.2199290","journal-title":"in IEEE Transactions on Multimedia"},{"issue":"2","key":"8904_CR29","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.jnca.2009.10.001","volume":"33","author":"J Zhang","year":"2010","unstructured":"Zhang J, Varadharajan V (2010) Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications 33(2):63\u201375","journal-title":"Journal of Network and Computer Applications"},{"key":"8904_CR30","doi-asserted-by":"crossref","unstructured":"Zheng XL, Huang CT, Matthews M (2007) Chinese remainder theorem based group key management, in Proc. 45th ACMSE, Winston-Salem, NC, USA, 266\u2013271.","DOI":"10.1145\/1233341.1233389"}],"updated-by":[{"DOI":"10.1007\/s11042-020-09363-x","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T00:00:00Z","timestamp":1602288000000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08904-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08904-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08904-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T19:40:06Z","timestamp":1623094806000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08904-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,8]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["8904"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08904-8","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11042-020-09363-x","asserted-by":"object"}]},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,8]]},"assertion":[{"value":"12 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2020","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Tables 1, 3, 4, 5, 6, 7, 8 and the body texts in the original publication contain incorrect symbols. The original article article has been corrected.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}