1Lee W. Key distribution and management for conditional access system on DBS[A]. Proc of International Conference on Cryptology and Information Security [C]. Seoul, KR: KIISC, 1996. 82-86.
2Tu F K, Laih C S, Tung H H. On key distribution management for conditional access system on Pay-TV system [J ]. IEEE Trans on Consumer Electronics,1999, 45(1):151-158.
3Cutts D J. DVB conditional access [J]. IEEE Electronics and Communication Engineering Journal,1997, 9(1): 21-27.
4ETR 289, Support for use of scrambling and conditional access (CA) within digital broadcasting systems, Oct. 1996[S].
5Akl S G, Taylor P D. Cryptographic solution to a problem of access control in a hierarchy [J]. ACM Trans Computer Systems, 1983, 1 (3): 239- 248.
6Harn L, Lin H Y. A new cryptographic key generation scheme for multilevel data security[J]. Computers and Security, 1990, 9(6): 539-546.
7Rosen K. Elementary number theory and its application[M]. San Francisco :Willey, 1993. 180- 190.
8Zou X, Ramamurthy B S, Magliveras S. Chinese Remainder Theorem based hierarchical access control for secure group communications [A]. ICICS 2001[C].Xi' an, CN: Springer-Verlag, 2001. 381 - 385.
9Chiou G, Chen W. Secure broadcasting using the secure lock[J]. IEEE Trans on Software Engineering,1989, 15(8) :929-934.