2015
DOI: 10.1155/2015/807213
|View full text |Cite
|
Sign up to set email alerts
|

Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

Abstract: Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…Soon after, Mishra et al demonstrated that Yang et al's scheme was vulnerable to the password guessing attack and the denial of service attack . In 2015, Zhang et al (2015) also proposed a session key attack against Yang et al's scheme. To surmount the weakness, Zhang et al proposed a provable secure and efficient DRM authentication scheme using smart card based on ECC.…”
Section: Smart-card-based Work On Drmmentioning
confidence: 99%
See 1 more Smart Citation
“…Soon after, Mishra et al demonstrated that Yang et al's scheme was vulnerable to the password guessing attack and the denial of service attack . In 2015, Zhang et al (2015) also proposed a session key attack against Yang et al's scheme. To surmount the weakness, Zhang et al proposed a provable secure and efficient DRM authentication scheme using smart card based on ECC.…”
Section: Smart-card-based Work On Drmmentioning
confidence: 99%
“…Here, the security of the proposed scheme will be examined by checking if it satisfies several important security requirements raised by some related works (Amin et al, 2016;Chang et al, 2013Chang et al, , 2010Mishra et al, 2015;Yang et al, 2013;Zhang et al, 2015Zhang et al, , 2009Zou et al, 2010). Our discussions will include information leakage attack resistance, user and digital content anonymity, user untraceability, mutual authentication, and password guessing attack resistance.…”
Section: Security Analysismentioning
confidence: 99%
“…Later on, Chang et al [9] pointed that [8] is insecure against stolen device attacks and proposed an improved scheme for DRM. Mishra et al [10] proved that the scheme of Zhang et al [11] was vulnerable to password guessing attacks and insider attacks and proposed an improved biometric-based scheme for DRM. In 2015, Jung et al [12] proposed an ECC-based authentication scheme for DRM.…”
Section: Introductionmentioning
confidence: 99%
“…The disclosure of an essentially confidential document in an enterprise may cause a big financial loss. Therefore, a service provider needs a copyright of security for digital media in a DRM system 6‐10 . The main focus of DRM scheme is combining the tools, technologies and A policies to control the access on DC 1‐3,6,8,10‐14 .…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, a service provider needs a copyright of security for digital media in a DRM system. [6][7][8][9][10] The main focus of DRM scheme is combining the tools, technologies and A policies to control the access on DC. [1][2][3]6,8,[10][11][12][13][14] Therefore, the digital license and DC encryption are adopted to ensure security.…”
Section: Introductionmentioning
confidence: 99%