The growing features of multimedia distribution across multiple smart devices have attained significant attention of many industries and users. In this context, digital rights management (DRM) is the system, which tries to ensure authorized content distribution. For much diverse and productive research in content distribution, DRM is paying attention to provide a better DRM protocol according to current requirements. But the violation of copyright protection of digital content (video, audio, and secret documents) still has a significant issue of concern. Not only solely copyright protection but also stolen smart cards which keep the license and more specific information of a user is also an attentive concern of DRM users. In this paper, we introduced an authenticated key agreement protocol which maintains secure and authorized content distribution with successful smart card revocation. Moreover, the proposed scheme has simulated under AVISPA tool, which informally confirms the security of the protocol. The formal proof security is given in the random oracle model and then done the performance evaluation. The comparison with the relevant existing schemes shows the advantage of the proposed scheme. It identified that the proposed protocol achieves all the desirable security and performance attributes with valid smart card revocation.
KEYWORDSanonymity, digital rights management systems, multimedia security, mutual authentication
INTRODUCTIONIn very few amounts of time, e-commerce industries have acquired a massive market of digital content distribution. The digital content distribution plays a crucial role in the e-commerce industry. In particular, live video streaming and e-books are also becoming more and more popular, and they also have immense importance in terms of revenue while digital content distribution authorities face many challenges such as secure content distribution, copyright issue, fixing the user right etc. Thus, the DRM system tries to facilitate multimedia users against any suspicious activity. It is developed to prevent illegal content consumption. Initially, DRM protocols either extend over public key infrastructure (PKI) or identity-based public key infrastructure (ID-PKI). PKI occurred certificate management problem which needs revocation, storage, distribution, and validation of the certificate, as an authentic outcome. The trusted authority becomes the choke point for this extensive area network. The ID-PKI has the drawback of key escrow. However, for secure and authorized content distribution, it is necessary to eliminate these flaws from the existing DRM system.DRM system stores the security parameters and digital license in a smart card (SC). These security parameters are protected with a password, biometric, and server secret key. Otherwise, it may lead to the misuse of the lost smart card Int J Commun Syst. 2020;33:e4388.wileyonlinelibrary.com/journal/dac