2014
DOI: 10.1007/s11042-014-2361-z
|View full text |Cite
|
Sign up to set email alerts
|

A more secure digital rights management authentication scheme based on smart card

Abstract: Digital rights management (DRM) system is a technology based mechanism to ensure only authorized access and legal distribution/consumption of the protected digital content. DRM system deals with the whole lifecycle of the digital content including production, management, distribution and consumption. DRM schemes are effective means for the transfer of digital content and safeguard the intellectual property. Recently, Yang et al. proposed a smart-card based DRM authentication scheme providing mutual authenticat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 30 publications
(36 reference statements)
0
11
0
Order By: Relevance
“…However, these designed protocols were vulnerable to various potential attacks, including privileged insider, impersonation and offline password guessing attacks, because they relied exclusively on the password. Many subsequent MAKA schemes have been designed to overcome these security weaknesses using smart cards [7]- [9] and/or biometrics [10]- [12]. However, these schemes stored user sensitive data in a server database, hence if the server stored data is revealed by an adversary, the whole system collapses.…”
Section: A Background and Motivationmentioning
confidence: 99%
“…However, these designed protocols were vulnerable to various potential attacks, including privileged insider, impersonation and offline password guessing attacks, because they relied exclusively on the password. Many subsequent MAKA schemes have been designed to overcome these security weaknesses using smart cards [7]- [9] and/or biometrics [10]- [12]. However, these schemes stored user sensitive data in a server database, hence if the server stored data is revealed by an adversary, the whole system collapses.…”
Section: A Background and Motivationmentioning
confidence: 99%
“…For the analysis of the security of Chaudhry et al and the proposed scheme in this paper, we consider the adversarial model with following the capacity of adversary: The adversary has full control over the public communication channel, which means that can eavesdrop, insert, delete, alter, or intercept any of the transmitted messages of the public channel. If obtains a stolen or lost mobile device of a user in some way, he/she is able to extract the secret parameters from the device using side-channel attacks [ 33 36 ]. is capable of enumerating off-line all of the possible items in the Cartesian product within polynomial time, where and denote the dictionary spaces of the identity and password, respectively [ 37 , 38 ].…”
Section: Preliminary Knowledgementioning
confidence: 99%
“…If obtains a stolen or lost mobile device of a user in some way, he/she is able to extract the secret parameters from the device using side-channel attacks [ 33 36 ].…”
Section: Preliminary Knowledgementioning
confidence: 99%
“…1,2,14 The protocol of Kuo et al 1 is secure against stolen smart card similar to the protocol of Li et al But the protocol of Bapana et al 14 is vulnerable to stolen smart card and stolen server attacks. In the same year, Kumari et al 15 proposed a powerful scheme that is resistant against stolen smart card, stolen verifier, and insider attacks. Also, some lightweight schemes have been recently designed.…”
Section: Related Workmentioning
confidence: 99%