Browse > Article
http://dx.doi.org/10.7840/KICS.2011.36C.3.133

Digital Contents Protection Without Server Authentication Using Smart Cards  

Kim, Young-Sik (조선대학교, 정보통신공학과)
Lim, Dae-Woon (동국대학교 정보통신공학과)
Abstract
Nowadays, it is considered as an important task to protect digital contents from illegal use and reproduction. In many cases, there are secure servers to authenticate the allowed users and the user authentication process is performed by communication between the servers and users. However, if the number of users and contents are increased, the servers should treat a large amount of authentication loads and the authentication cost will be considerably increased. Moreover, this scheme is not adequate for some players in which only a limited function of communication is deployed. In order to solve this problem, this paper proposes an authentication method which can certificate both the digital contents and players, and prevent illegal reproduction without the certification server. The proposed scheme is secure in the replay attack, the man in the middle attack, and data substitution attack.
Keywords
DRM; Digital Contents; Mutual Authentication; Smart Card;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. L. Hsu, "Security of two remote user authentication schemes using smart cards," IEEE Trans. Consumer Electron., Vol.49, No.4, pp.1196-1198, Nov. 2003.   DOI   ScienceOn
2 W.-S. Juang, "Efficient multi-server password authenticated key agreement using smart cards," IEEE Trans. Consumer Electron., Vol.50, pp.251-255, 2004.   DOI   ScienceOn
3 W.-S. Juang and J.-L. Wu, "Efficient User Authentication and Key Agreement With User Privacy Protection," Int. J. Network Security, Vol.7, No.1, pp .120-129, July 2008.
4 F. Bao, R. H. Deng, and P. Feng, "An efficeint and practical scheme for privacy protection in the e-commerce of digital goods," ICICS 2000, LNCS 2836, pp.162-170, 2001.
5 F. Pestoni, "IBM response to DVB-CPT call for proposals for content protection and copy management," http://www.almaden,ibm.com/software/ds/ContentAssurance/papers/xCP_DVB.pdf
6 B. Popescu, B. Crispo, A. Tanenbaum, F. Kamperman, "Systems and architectures: A DRM security architecture for home networks," in Proc. 4th ACM Workshop DRM, 2004.
7 A. M. Eskicioglu and E. J. Delp, "An overview of multimedia content protection in consumer electronic devices," Signal Processing: Image Commun., Vol.16, No.5, pp.681-699, Apr. 2001.   DOI   ScienceOn
8 C. K. Chan and L. M. Cheng, "Cryptoanalysis of a remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron., Vol.46, No.4, pp.992-993, Nov. 2000.   DOI   ScienceOn
9 L. Lamport, "Password authentication with insecure communication," Commun. ACM, Vol.24, No.11, pp.770-772, 1981.   DOI   ScienceOn
10 M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron., Vol.46, No.1, pp.28-30, Feb. 2000.   DOI   ScienceOn
11 H. M. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron. Vol.46, No.4, pp.958-961, Nov. 2000.   DOI   ScienceOn
12 H. Y. Chien, J. K Jan, and Y. M. Tseng, "An efficient and practical solution to remote authentication: Smart card," Computers and Security, Vol.21, No.4, pp.372-375, Aug. 2002.   DOI   ScienceOn