2020
DOI: 10.1002/ett.4199
|View full text |Cite
|
Sign up to set email alerts
|

LWEDM: Learning with error based secure mobile digital rights management system

Abstract: Mobile multimedia security is essential to ensure a secure communication in industries, businesses, and organizations. Mobile multimedia is a new concept for an enterprise, where organizations need to be secure. In the last decade, a number of anonymous authentication protocols have been designed based on factorization and discrete logarithm assumptions. Shor's algorithm solves a number‐theoretic assumption in polynomial time using postquantum computers that creates a trouble. However, learning with errors is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 38 publications
(90 reference statements)
0
11
0
Order By: Relevance
“…We have taken into account the recently published quantum safe cryptosystems for our study. During our study we identify Dharminder and Chandran 9 and Dharminder 10 are not safe against quantum attacks. These protocols do not achieve security against signal leakage attack (SLA) on the basis of our cryptanalysis.…”
Section: Introductionmentioning
confidence: 82%
See 3 more Smart Citations
“…We have taken into account the recently published quantum safe cryptosystems for our study. During our study we identify Dharminder and Chandran 9 and Dharminder 10 are not safe against quantum attacks. These protocols do not achieve security against signal leakage attack (SLA) on the basis of our cryptanalysis.…”
Section: Introductionmentioning
confidence: 82%
“…We have analyzed Dharminder's LWE-based KEA protocol for mobile digital rights management systems. 10 The user registration phase of their protocol is shown in Table 1, and the complete mutual authentication structure is shown in Table 2. Although this scheme is efficient, simple, and functional for cellular devices in the post-quantum era, but it is susceptible to SLA.…”
Section: On the Security Of Dharminder's Lwe-based Kea Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…In China, under the joint promotion of online education institutions and enterprises, course-teaching and tutorial-class style online learning platforms have become the mainstream form of online learning [13]. A variety of online learning platforms have sprung up one after another, such as MOOC, chuanke.com, and the mobile app of "Xuexitong" developed by Chaoxing, etc., and the corporation between online learning platforms, education institutions, and teachers has become a new mode of online education in China [14]. Such new mode has reformed the traditional education mode, broken temporal and spatial restraints, and enabled students to use their time fragments to learn at any time they want [15].…”
Section: Introductionmentioning
confidence: 99%