A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography

6Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

As the internet makes data transmission easy and fast, digital contents of all kinds can be spread all over the world at a shocking speed. Along with such amazing swiftness and convenience, however, modern computer and communication technologies have also brought various kinds of issues associated with digital rights management. Digital rights management (DRM) systems are access control technologies used to restrict the use, modification, and distribution of proprietary hardware and copyrighted works. Now, in view of modern people's heavy dependence on their mobile devices, we consider it a good idea to design a DRM scheme on the basis of elliptic curve cryptography (ECC). In this paper, we shall review Amin et al.'s (2016) scheme and point out some security weaknesses we have found. Then, with the security flaws mended, we shall propose an improved ECC-based protocol for DRM that is especially suitable for applications on mobile devices.

References Powered by Scopus

Identity-based encryption from the weil pairing

6099Citations
N/AReaders
Get full text

On the Security of Public Key Protocols

4339Citations
N/AReaders
Get full text

Elliptic curve cryptosystems

3809Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A low-complexity edward-curve point multiplication architecture

14Citations
N/AReaders
Get full text

PrivDRM: A Privacy-preserving Secure Digital Right Management System

12Citations
N/AReaders
Get full text

An Improved Authentication Scheme for Digital Rights Management System

8Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Lee, C. C., Li, C. T., Chen, Z. W., Chen, S. D., & Lai, Y. M. (2019). A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography. International Journal of Electronic Security and Digital Forensics, 11(1), 96–107. https://doi.org/10.1504/IJESDF.2019.096529

Readers over time

‘20‘22‘23‘2400.751.52.253

Readers' Seniority

Tooltip

Professor / Associate Prof. 1

100%

Readers' Discipline

Tooltip

Computer Science 1

100%

Save time finding and organizing research with Mendeley

Sign up for free
0