JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Digital Contents Protection Without Server Authentication Using Smart Cards
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Digital Contents Protection Without Server Authentication Using Smart Cards
Kim, Young-Sik; Lim, Dae-Woon;
  PDF(new window)
 Abstract
Nowadays, it is considered as an important task to protect digital contents from illegal use and reproduction. In many cases, there are secure servers to authenticate the allowed users and the user authentication process is performed by communication between the servers and users. However, if the number of users and contents are increased, the servers should treat a large amount of authentication loads and the authentication cost will be considerably increased. Moreover, this scheme is not adequate for some players in which only a limited function of communication is deployed. In order to solve this problem, this paper proposes an authentication method which can certificate both the digital contents and players, and prevent illegal reproduction without the certification server. The proposed scheme is secure in the replay attack, the man in the middle attack, and data substitution attack.
 Keywords
DRM;Digital Contents;Mutual Authentication;Smart Card;
 Language
Korean
 Cited by
1.
스마트 기기를 이용한 안전한 QR-Login 사용자 인증 프로토콜의 설계 및 중요 정보의 안전성 보증을 위한 방법,이재식;유한나;조창현;전문석;

한국통신학회논문지, 2012. vol.37C. 10, pp.949-964 crossref(new window)
 References
1.
L. Lamport, "Password authentication with insecure communication," Commun. ACM, Vol.24, No.11, pp.770-772, 1981. crossref(new window)

2.
M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron., Vol.46, No.1, pp.28-30, Feb. 2000. crossref(new window)

3.
C. K. Chan and L. M. Cheng, "Cryptoanalysis of a remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron., Vol.46, No.4, pp.992-993, Nov. 2000. crossref(new window)

4.
H. M. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron. Vol.46, No.4, pp.958-961, Nov. 2000. crossref(new window)

5.
H. Y. Chien, J. K Jan, and Y. M. Tseng, "An efficient and practical solution to remote authentication: Smart card," Computers and Security, Vol.21, No.4, pp.372-375, Aug. 2002. crossref(new window)

6.
C. L. Hsu, "Security of two remote user authentication schemes using smart cards," IEEE Trans. Consumer Electron., Vol.49, No.4, pp.1196-1198, Nov. 2003. crossref(new window)

7.
W.-S. Juang, "Efficient multi-server password authenticated key agreement using smart cards," IEEE Trans. Consumer Electron., Vol.50, pp.251-255, 2004. crossref(new window)

8.
W.-S. Juang and J.-L. Wu, "Efficient User Authentication and Key Agreement With User Privacy Protection," Int. J. Network Security, Vol.7, No.1, pp .120-129, July 2008.

9.
F. Bao, R. H. Deng, and P. Feng, "An efficeint and practical scheme for privacy protection in the e-commerce of digital goods," ICICS 2000, LNCS 2836, pp.162-170, 2001.

10.
F. Pestoni, "IBM response to DVB-CPT call for proposals for content protection and copy management," http://www.almaden,ibm.com/software/ds/ContentAssurance/papers/xCP_DVB.pdf

11.
B. Popescu, B. Crispo, A. Tanenbaum, F. Kamperman, "Systems and architectures: A DRM security architecture for home networks," in Proc. 4th ACM Workshop DRM, 2004.

12.
A. M. Eskicioglu and E. J. Delp, "An overview of multimedia content protection in consumer electronic devices," Signal Processing: Image Commun., Vol.16, No.5, pp.681-699, Apr. 2001. crossref(new window)