Title: A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography

Authors: Cheng-Chi Lee; Chun-Ta Li; Zhi-Wei Chen; Shun-Der Chen; Yan-Ming Lai

Addresses: Department of Library and Information Science, Fu Jen Catholic University, No. 510, Zhongzheng Rd., Xinzhuang Dist., New Taipei City, 24205, Taiwan; Department of Photonics and Communication Engineering, Asia University, Taichung 413, Taiwan ' Department of Information Management, Tainan University of Technology, Ong Jheng Road, Tainan 710, Taiwan ' Department of Library and Information Science, Fu Jen Catholic University, No. 510, Zhongzheng Rd., Xinzhuang Dist., New Taipei City, 24205, Taiwan ' Department of Library and Information Science, Fu Jen Catholic University, No. 510, Zhongzheng Rd., Xinzhuang Dist., New Taipei City, 24205, Taiwan ' Department of Computer Science and Information Engineering, National Taiwan University, No. 1, Sec. 4, Roosevelt Rd., Taipei City, 10617, Taiwan

Abstract: As the internet makes data transmission easy and fast, digital contents of all kinds can be spread all over the world at a shocking speed. Along with such amazing swiftness and convenience, however, modern computer and communication technologies have also brought various kinds of issues associated with digital rights management. Digital rights management (DRM) systems are access control technologies used to restrict the use, modification, and distribution of proprietary hardware and copyrighted works. Now, in view of modern people's heavy dependence on their mobile devices, we consider it a good idea to design a DRM scheme on the basis of elliptic curve cryptography (ECC). In this paper, we shall review Amin et al.'s (2016) scheme and point out some security weaknesses we have found. Then, with the security flaws mended, we shall propose an improved ECC-based protocol for DRM that is especially suitable for applications on mobile devices.

Keywords: biometric; digital rights management; DRM; elliptic curve cryptography; ECC; mobile device; user's anonymity.

DOI: 10.1504/IJESDF.2019.096529

International Journal of Electronic Security and Digital Forensics, 2019 Vol.11 No.1, pp.96 - 117

Received: 30 Aug 2017
Accepted: 01 Mar 2018

Published online: 05 Dec 2018 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article