As the internet makes data transmission easy and fast, digital contents of all kinds can be spread all over the world at a shocking speed. Along with such amazing swiftness and convenience, however, modern computer and communication technologies have also brought various kinds of issues associated with digital rights management. Digital rights management (DRM) systems are access control technologies used to restrict the use, modification, and distribution of proprietary hardware and copyrighted works. Now, in view of modern people's heavy dependence on their mobile devices, we consider it a good idea to design a DRM scheme on the basis of elliptic curve cryptography (ECC). In this paper, we shall review Amin et al.'s (2016) scheme and point out some security weaknesses we have found. Then, with the security flaws mended, we shall propose an improved ECC-based protocol for DRM that is especially suitable for applications on mobile devices.
CITATION STYLE
Lee, C. C., Li, C. T., Chen, Z. W., Chen, S. D., & Lai, Y. M. (2019). A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography. International Journal of Electronic Security and Digital Forensics, 11(1), 96–107. https://doi.org/10.1504/IJESDF.2019.096529
Mendeley helps you to discover research relevant for your work.