A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography

6Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

As the internet makes data transmission easy and fast, digital contents of all kinds can be spread all over the world at a shocking speed. Along with such amazing swiftness and convenience, however, modern computer and communication technologies have also brought various kinds of issues associated with digital rights management. Digital rights management (DRM) systems are access control technologies used to restrict the use, modification, and distribution of proprietary hardware and copyrighted works. Now, in view of modern people's heavy dependence on their mobile devices, we consider it a good idea to design a DRM scheme on the basis of elliptic curve cryptography (ECC). In this paper, we shall review Amin et al.'s (2016) scheme and point out some security weaknesses we have found. Then, with the security flaws mended, we shall propose an improved ECC-based protocol for DRM that is especially suitable for applications on mobile devices.

Cite

CITATION STYLE

APA

Lee, C. C., Li, C. T., Chen, Z. W., Chen, S. D., & Lai, Y. M. (2019). A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography. International Journal of Electronic Security and Digital Forensics, 11(1), 96–107. https://doi.org/10.1504/IJESDF.2019.096529

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free