Authenticated content distribution framework for digital rights management systems with smart card revocation

2020 ◽  
Vol 33 (9) ◽  
pp. e4388
Author(s):  
Dheerendra Mishra ◽  
Saurabh Rana
Author(s):  
Tom S. Chan

While delivering content via the Internet can be efficient and economical, content owners risk losing control of their intellectual property. Any business that wishes to control access to, and use of its intellectual property, is a potential user of Digital Rights Management (DRM) technologies. Traditional DRM has a passive one-way downstream consumption of content from producer to consumer focus primarily concerns digital rights enforcement. This model does not translate well to the education environment where openness, informal decision making, sharing of ideas, and decentralization are valued. Collaboration and multiple authorships are common in the educational environment, as is the repurposing and modification of digital content used for teaching and learning. A DRM system for educational content distribution must be substantially more sophisticated and flexible than what is available right now to gain support in the educational community.


2015 ◽  
Vol 2015 ◽  
pp. 1-16
Author(s):  
Yuanyuan Zhang ◽  
Muhammad Khurram Khan ◽  
Jianhua Chen ◽  
Debiao He

Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers from the password guessing attack and the denial of service attack. Moreover, they also demonstrated that Yang et al.’s scheme is not efficient enough when the user inputs an incorrect password. In this paper, we analyze Yang et al.’s scheme again, and find that their scheme is vulnerable to the session key attack. And, there are some mistakes in their scheme. To surmount the weakness of Yang et al.’s scheme, we propose a more efficient and provable secure digital rights management authentication scheme using smart card based on elliptic curve cryptography.


Sign in / Sign up

Export Citation Format

Share Document