Title: A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography
Authors: Cheng-Chi Lee; Chun-Ta Li; Zhi-Wei Chen; Shun-Der Chen; Yan-Ming Lai
Addresses: Department of Library and Information Science, Fu Jen Catholic University, No. 510, Zhongzheng Rd., Xinzhuang Dist., New Taipei City, 24205, Taiwan; Department of Photonics and Communication Engineering, Asia University, Taichung 413, Taiwan ' Department of Information Management, Tainan University of Technology, Ong Jheng Road, Tainan 710, Taiwan ' Department of Library and Information Science, Fu Jen Catholic University, No. 510, Zhongzheng Rd., Xinzhuang Dist., New Taipei City, 24205, Taiwan ' Department of Library and Information Science, Fu Jen Catholic University, No. 510, Zhongzheng Rd., Xinzhuang Dist., New Taipei City, 24205, Taiwan ' Department of Computer Science and Information Engineering, National Taiwan University, No. 1, Sec. 4, Roosevelt Rd., Taipei City, 10617, Taiwan
Abstract: As the internet makes data transmission easy and fast, digital contents of all kinds can be spread all over the world at a shocking speed. Along with such amazing swiftness and convenience, however, modern computer and communication technologies have also brought various kinds of issues associated with digital rights management. Digital rights management (DRM) systems are access control technologies used to restrict the use, modification, and distribution of proprietary hardware and copyrighted works. Now, in view of modern people's heavy dependence on their mobile devices, we consider it a good idea to design a DRM scheme on the basis of elliptic curve cryptography (ECC). In this paper, we shall review Amin et al.'s (2016) scheme and point out some security weaknesses we have found. Then, with the security flaws mended, we shall propose an improved ECC-based protocol for DRM that is especially suitable for applications on mobile devices.
Keywords: biometric; digital rights management; DRM; elliptic curve cryptography; ECC; mobile device; user's anonymity.
DOI: 10.1504/IJESDF.2019.096529
International Journal of Electronic Security and Digital Forensics, 2019 Vol.11 No.1, pp.96 - 117
Received: 30 Aug 2017
Accepted: 01 Mar 2018
Published online: 05 Dec 2018 *