A more secure digital rights management authentication scheme based on smart card

被引:10
|
作者
Kumari, Saru [1 ]
Khan, Muhammad Khurram [2 ]
Li, Xiong [3 ]
机构
[1] Dr BRA Univ, Agra Coll, Dept Math, Agra, Uttar Pradesh, India
[2] King Saud Univ, POB 92144, Riyadh 11653, Saudi Arabia
[3] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
基金
中国国家自然科学基金;
关键词
Digital rights management; Authentication; Cryptanalysis; Forward secrecy; Secure password changing facility; DRM;
D O I
10.1007/s11042-014-2361-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital rights management (DRM) system is a technology based mechanism to ensure only authorized access and legal distribution/consumption of the protected digital content. DRM system deals with the whole lifecycle of the digital content including production, management, distribution and consumption. DRM schemes are effective means for the transfer of digital content and safeguard the intellectual property. Recently, Yang et al. proposed a smart-card based DRM authentication scheme providing mutual authentication and session key establishment among all the participants of the DRM environment. We show that their scheme does not resist threats like smart card attack; fails to provide proper password update facility; and does not follow forward secrecy. To overcome these weaknesses, we propose an improvement of Yang et al.'s scheme. The security of our scheme remains intact even if the smart card of the user is lost. In our scheme, user's smart card is capable of verifying the correctness of the inputted identity and password and hence contributes to achieve an efficient and user- friendly password update phase. In addition, the session keys established between the participating entities are highly secure by virtue of forward secrecy property. We conduct security analysis and comparison with related schemes to evaluate our improved scheme. During comparison, we also highlight the computational cost/time complexity at the user and the server side in terms of the execution time of various operations. The entire analysis shows that the design of the improved scheme is robust enough for the for DRM environment.
引用
收藏
页码:1135 / 1158
页数:24
相关论文
共 50 条
  • [21] Smart Card Based User Authentication Scheme with Anonymity
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 : 220 - 233
  • [22] A more Multifactor Secure Authentication Scheme based on graphical authentication
    Joshi, Ashish
    Kumar, Sonu
    Goudar, R. H.
    2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2012, : 186 - 189
  • [23] Secure password-based remote user authentication scheme against smart card security breach
    Wang, Ding
    Ma, Chun-Guang
    Zhang, Qi-Ming
    Zhao, Sendong
    Journal of Networks, 2013, 8 (01) : 148 - 155
  • [24] A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Tian-Fu Lee
    Chuan-Ming Liu
    Journal of Medical Systems, 2013, 37
  • [25] Enhanced smart-card-based authentication scheme providing forward-secure key agreement
    Asadpour, Mahdi
    Sattarzadeh, Behnam
    Jalili, Rasool
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 447 - 458
  • [26] A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Lee, Tian-Fu
    Liu, Chuan-Ming
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (03)
  • [27] A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card
    Madhusudhan, R.
    Hegde, Manjunath
    Memon, Imran
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (11)
  • [28] Secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks
    Park, YoHan
    Lee, SungYup
    Kim, ChangKyun
    Park, YoungHo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (07) : 1 - 11
  • [29] An Improved Authentication Scheme for Digital Rights Management System
    Hussain, Sajid
    Bin Zikria, Yousaf
    Mallah, Ghulam Ali
    Chen, Chien-Ming
    Alshehri, Mohammad Dahman
    Ishmanov, Farruh
    Chaudhry, Shehzad Ashraf
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [30] A More Efficient and Secure Untraceable Remote User Password Authentication Scheme Using Smart Card with Session Key Agreement
    Sahu, Ajay Kumar
    Kumar, Ashish
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 395 - 410