메뉴 건너뛰기




Volumn 75, Issue 1, 2016, Pages 405-424

A provably secure and efficient authentication scheme for access control in mobile pay-TV systems

Author keywords

Authentication scheme; Bilinear pairings; Elliptic curves; Impersonation attack; Mobile pay TV systems; Provable security

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY;

EID: 84953639516     PISSN: 13807501     EISSN: 15737721     Source Type: Journal    
DOI: 10.1007/s11042-014-2296-4     Document Type: Article
Times cited : (27)

References (32)
  • 2
    • 79956133331 scopus 로고    scopus 로고
    • An efficient anonymous authentication protocol for mobile pay-TV
    • Chen T-H, Chen Y-C, Shih W-K, Wei H-W (2011) An efficient anonymous authentication protocol for mobile pay-TV. J Netw Comput Appl 34(4):1131–1137
    • (2011) J Netw Comput Appl , vol.34 , Issue.4 , pp. 1131-1137
    • Chen, T.-H.1    Chen, Y.-C.2    Shih, W.-K.3    Wei, H.-W.4
  • 3
    • 84953642772 scopus 로고
    • ITU-R Rec
    • Conditional-Access Broadcasting System (1992) ITU-R Rec. 810
    • (1992) 810
    • System, C.-A.B.1
  • 4
    • 84953642773 scopus 로고    scopus 로고
    • IP datacast over DVB-H: service purchase and protection
    • Digital Video Broadcasting (DVB) (2007) IP datacast over DVB-H: service purchase and protection, ETSI TS 102 474 v1.1.1 Std
    • (2007) ETSI TS 102 474 v1.1.1 Std
    • Broadcasting, D.V.1
  • 5
    • 84902245219 scopus 로고    scopus 로고
    • Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
    • Farash M-S, Attari M-A (2013) Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. ISC Int J Inform Secur 5(1):18–43
    • (2013) ISC Int J Inform Secur , vol.5 , Issue.1 , pp. 18-43
    • Farash, M.-S.1    Attari, M.-A.2
  • 6
    • 84890424682 scopus 로고    scopus 로고
    • An enhanced authenticated key agreement for session initiation protocol
    • Farash M-S, Attari M-A (2013) An enhanced authenticated key agreement for session initiation protocol. Inf Technol Control 42(4):333–342
    • (2013) Inf Technol Control , vol.42 , Issue.4 , pp. 333-342
    • Farash, M.-S.1    Attari, M.-A.2
  • 7
    • 84899645425 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing
    • Farash M-S, Attari M-A (2013) Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dyn 76(2):1203–1213
    • (2013) Nonlinear Dyn , vol.76 , Issue.2 , pp. 1203-1213
    • Farash, M.-S.1    Attari, M.-A.2
  • 8
    • 84902266968 scopus 로고    scopus 로고
    • An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    • Farash M-S, Attari M-A (2014) An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn 77(1-2):399–411
    • (2014) Nonlinear Dyn , vol.77 , Issue.1-2 , pp. 399-411
    • Farash, M.-S.1    Attari, M.-A.2
  • 9
    • 84902778355 scopus 로고    scopus 로고
    • An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems
    • Farash M-S, Attari M-A (2014) An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems. Inf Technol Control 43 (2):143–150
    • (2014) Inf Technol Control , vol.43 , Issue.2 , pp. 143-150
    • Farash, M.-S.1    Attari, M.-A.2
  • 10
    • 84919877584 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
    • Farash M-S, Attari M-A (2014) Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput. doi:10.1007/s11227-014-1272-0
    • (2014) J Supercomput
    • Farash, M.-S.1    Attari, M.-A.2
  • 11
    • 84919877261 scopus 로고    scopus 로고
    • An efficient client-client password-based authentication scheme with provable security
    • Farash M-S, Attari M-A (2014) An efficient client-client password-based authentication scheme with provable security. J Supercomput. doi:10.1007/s11227-014-1273-z
    • (2014) J Supercomput
    • Farash, M.-S.1    Attari, M.-A.2
  • 12
    • 84893678218 scopus 로고    scopus 로고
    • A pairing-free ID-based key agreement protocol with different PKGs
    • Farash M-S, Attari M-A (2014) A pairing-free ID-based key agreement protocol with different PKGs. Int J Netw Secur 16(2):143–148
    • (2014) Int J Netw Secur , vol.16 , Issue.2 , pp. 143-148
    • Farash, M.-S.1    Attari, M.-A.2
  • 13
    • 84905565168 scopus 로고    scopus 로고
    • secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks
    • Farash M-S, Attari M-A (2014) secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J Supercomput 69(1):395–411
    • (2014) J Supercomput , vol.69 , Issue.1 , pp. 395-411
    • Farash, M.-S.1    Attari, M.-A.2
  • 14
    • 84899624931 scopus 로고    scopus 로고
    • A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings
    • Farash M-S, Attari M-A, Bayat M (2012) A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings. IACSIT Int J Eng Technol 4(3):321–325
    • (2012) IACSIT Int J Eng Technol , vol.4 , Issue.3 , pp. 321-325
    • Farash, M.-S.1    Attari, M.-A.2    Bayat, M.3
  • 15
    • 79955735535 scopus 로고    scopus 로고
    • Vulnerability of two multiple-key agreement protocols
    • Farash M-S, Bayat M, Attari M-A (2011) Vulnerability of two multiple-key agreement protocols. Comput Electr Eng 37(2):199–204
    • (2011) Comput Electr Eng , vol.37 , Issue.2 , pp. 199-204
    • Farash, M.-S.1    Bayat, M.2    Attari, M.-A.3
  • 16
    • 84876280558 scopus 로고    scopus 로고
    • A new efficient authenticated multiple-key exchange protocol from bilinear pairings
    • Farash M-S, Attari M-A, Atani R-E, Jami M (2013) A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput Electr Eng 39(2):530–541
    • (2013) Comput Electr Eng , vol.39 , Issue.2 , pp. 530-541
    • Farash, M.-S.1    Attari, M.-A.2    Atani, R.-E.3    Jami, M.4
  • 18
    • 67349168446 scopus 로고    scopus 로고
    • BAT: a robust signature scheme for vehicular networks using binary authentication tree
    • Jiang Y, Shi M, Shen X, Lin C (2009) BAT: a robust signature scheme for vehicular networks using binary authentication tree. IEEE Trans Wirel Commun 8(4):1974–1983
    • (2009) IEEE Trans Wirel Commun , vol.8 , Issue.4 , pp. 1974-1983
    • Jiang, Y.1    Shi, M.2    Shen, X.3    Lin, C.4
  • 19
    • 77952263995 scopus 로고    scopus 로고
    • Improvements on Sun’s conditional access system in pay-TV broadcasting systems
    • Kim J-Y, Choi H-K (2010) Improvements on Sun’s conditional access system in pay-TV broadcasting systems. IEEE Trans Multimedia 12(4):337–340
    • (2010) IEEE Trans Multimedia , vol.12 , Issue.4 , pp. 337-340
    • Kim, J.-Y.1    Choi, H.-K.2
  • 21
    • 84874319277 scopus 로고    scopus 로고
    • A privacy?preserving acceleration authentication protocol for mobile pay-TV systems
    • Liu X, Zhang Y (2013) A privacy?preserving acceleration authentication protocol for mobile pay-TV systems. Secur Commun Netw 6(3):361–372
    • (2013) Secur Commun Netw , vol.6 , Issue.3 , pp. 361-372
    • Liu, X.1    Zhang, Y.2
  • 22
    • 0024717044 scopus 로고
    • A single conditional access system for satellite-cable and terrestrial TV
    • Michon V, Coutrot F (1989) A single conditional access system for satellite-cable and terrestrial TV. IEEE Trans Consum Electron 35(3):464
    • (1989) IEEE Trans Consum Electron , vol.35 , Issue.3 , pp. 464
    • Michon, V.1    Coutrot, F.2
  • 23
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • Springer, Heidelberg
    • Pointcheval D, Stern J (1996) Security proofs for signature schemes. In: Maurer U M (ed) EUROCRYPT 1996. LNCS, vol 1070. Springer, Heidelberg, pp 387–398
    • (1996) EUROCRYPT 1996. LNCS , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2    Maurer, U.M.3
  • 25
    • 0042196056 scopus 로고    scopus 로고
    • Pay-TV system with strong privacy and non-repudiation protection
    • Song R, Korba L (2003) Pay-TV system with strong privacy and non-repudiation protection. IEEE Trans Consum Electron 49(2):408–413
    • (2003) IEEE Trans Consum Electron , vol.49 , Issue.2 , pp. 408-413
    • Song, R.1    Korba, L.2
  • 26
    • 68549115315 scopus 로고    scopus 로고
    • An efficient authentication scheme for access control in mobile pay-TV systems
    • Sun H-M, Leu M-C (2009) An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 11(5):947–959
    • (2009) IEEE Trans Multimedia , vol.11 , Issue.5 , pp. 947-959
    • Sun, H.-M.1    Leu, M.-C.2
  • 27
    • 54949102324 scopus 로고    scopus 로고
    • Flexible-pay-per-channel: a new model for content access control in pay-TV broadcasting systems
    • Sun H-M, Chen C-M, Shieh C-Z (2008) Flexible-pay-per-channel: a new model for content access control in pay-TV broadcasting systems. IEEE Trans Multimedia 10(6):1109–1120
    • (2008) IEEE Trans Multimedia , vol.10 , Issue.6 , pp. 1109-1120
    • Sun, H.-M.1    Chen, C.-M.2    Shieh, C.-Z.3
  • 28
    • 41549131381 scopus 로고    scopus 로고
    • Efficient key distribution for access control in pay-TV systems
    • Wang S-Y, Laih C-S (2008) Efficient key distribution for access control in pay-TV systems. IEEE Trans Multimedia 10(3):480–492
    • (2008) IEEE Trans Multimedia , vol.10 , Issue.3 , pp. 480-492
    • Wang, S.-Y.1    Laih, C.-S.2
  • 29
    • 84878354791 scopus 로고    scopus 로고
    • Improved one-to-many authentication scheme for access control in pay-TV systems
    • Wang H, Qin B (2012) Improved one-to-many authentication scheme for access control in pay-TV systems. IET Inf Secur 6(4):281–290
    • (2012) IET Inf Secur , vol.6 , Issue.4 , pp. 281-290
    • Wang, H.1    Qin, B.2
  • 30
    • 63049116480 scopus 로고    scopus 로고
    • An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • Yang J-H, Chang C-C (2009) An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput secur 28(3):138–143
    • (2009) Comput secur , vol.28 , Issue.3 , pp. 138-143
    • Yang, J.-H.1    Chang, C.-C.2
  • 31
    • 84870495205 scopus 로고    scopus 로고
    • A secure and efficient authentication scheme for access control in mobile pay-TV systems
    • Yeh L-Y, Tsaur W (2012) A secure and efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 14(6):1690–1693
    • (2012) IEEE Trans Multimedia , vol.14 , Issue.6 , pp. 1690-1693
    • Yeh, L.-Y.1    Tsaur, W.2
  • 32
    • 16244398861 scopus 로고    scopus 로고
    • A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation
    • Yeung S-F, Lui J-C, Yau D-K (2005) A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation. IEEE Trans Multimedia 7(2):330–338
    • (2005) IEEE Trans Multimedia , vol.7 , Issue.2 , pp. 330-338
    • Yeung, S.-F.1    Lui, J.-C.2    Yau, D.-K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.