Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al....

Full description

Bibliographic Details
Main Authors: Yuanyuan Zhang, Muhammad Khurram Khan, Jianhua Chen, Debiao He
Format: Article
Language:English
Published: Hindawi Limited 2015-01-01
Series:Mathematical Problems in Engineering
Online Access:http://dx.doi.org/10.1155/2015/807213
id doaj-3d2fc41f7da9488bb83db0c2fdf011fe
record_format Article
spelling doaj-3d2fc41f7da9488bb83db0c2fdf011fe2020-11-24T21:54:49ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472015-01-01201510.1155/2015/807213807213Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve CryptographyYuanyuan Zhang0Muhammad Khurram Khan1Jianhua Chen2Debiao He3School of Mathematics and Statistics, Wuhan University, Wuhan 430072, ChinaCenter of Excellence in Information Assurance, King Saud University, Riyadh 12372, Saudi ArabiaSchool of Mathematics and Statistics, Wuhan University, Wuhan 430072, ChinaSchool of Mathematics and Statistics, Wuhan University, Wuhan 430072, ChinaSince the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers from the password guessing attack and the denial of service attack. Moreover, they also demonstrated that Yang et al.’s scheme is not efficient enough when the user inputs an incorrect password. In this paper, we analyze Yang et al.’s scheme again, and find that their scheme is vulnerable to the session key attack. And, there are some mistakes in their scheme. To surmount the weakness of Yang et al.’s scheme, we propose a more efficient and provable secure digital rights management authentication scheme using smart card based on elliptic curve cryptography.http://dx.doi.org/10.1155/2015/807213
collection DOAJ
language English
format Article
sources DOAJ
author Yuanyuan Zhang
Muhammad Khurram Khan
Jianhua Chen
Debiao He
spellingShingle Yuanyuan Zhang
Muhammad Khurram Khan
Jianhua Chen
Debiao He
Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
Mathematical Problems in Engineering
author_facet Yuanyuan Zhang
Muhammad Khurram Khan
Jianhua Chen
Debiao He
author_sort Yuanyuan Zhang
title Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
title_short Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
title_full Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
title_fullStr Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
title_full_unstemmed Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
title_sort provable secure and efficient digital rights management authentication scheme using smart card based on elliptic curve cryptography
publisher Hindawi Limited
series Mathematical Problems in Engineering
issn 1024-123X
1563-5147
publishDate 2015-01-01
description Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers from the password guessing attack and the denial of service attack. Moreover, they also demonstrated that Yang et al.’s scheme is not efficient enough when the user inputs an incorrect password. In this paper, we analyze Yang et al.’s scheme again, and find that their scheme is vulnerable to the session key attack. And, there are some mistakes in their scheme. To surmount the weakness of Yang et al.’s scheme, we propose a more efficient and provable secure digital rights management authentication scheme using smart card based on elliptic curve cryptography.
url http://dx.doi.org/10.1155/2015/807213
work_keys_str_mv AT yuanyuanzhang provablesecureandefficientdigitalrightsmanagementauthenticationschemeusingsmartcardbasedonellipticcurvecryptography
AT muhammadkhurramkhan provablesecureandefficientdigitalrightsmanagementauthenticationschemeusingsmartcardbasedonellipticcurvecryptography
AT jianhuachen provablesecureandefficientdigitalrightsmanagementauthenticationschemeusingsmartcardbasedonellipticcurvecryptography
AT debiaohe provablesecureandefficientdigitalrightsmanagementauthenticationschemeusingsmartcardbasedonellipticcurvecryptography
_version_ 1725865590623567872