A construction of post quantum secure authenticated key agreement design for mobile digital rights management system

被引:1
作者
Dadsena, Pradeep Kumar [1 ]
Jain, Jainendra [1 ]
Rana, Saurabh [2 ]
Dharminder, Dharminder [3 ]
机构
[1] Govt Engn Coll, Dept Math, Jagdalpur, India
[2] Chandigarh Univ, Dept Math, Chandigarh, India
[3] Amrita Vishwa Vidyapeetham, Amrita Sch Comp, Dept Comp Sci Engn, Chennai, India
关键词
Digital rights management system; Privacy; Security; Authentication; Ideal lattice; Learning with errors; DISCRETE LOGARITHMS; PROTOCOL; ALGORITHMS; LATTICES;
D O I
10.1007/s11042-023-14937-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The quantum computing being a threat motivates us to design a post quantum secure authentication protocol for mobile digital rights management system. In current, a post quantum secure protocol "learning with error based secure mobile digital rights management system" has been proposed. The protocol has been claimed to post quantum secure under the ring learning with errors assumption. We have analyzed that this protocol allows the server to keep a fixed private/public key that causes less communication and computation overheads. But, this leads to signal leakage/modified signal leakage attacks. In this paper, we have discussed signal leakage attacks during the authentication phase of the existing protocol. We have proposed a new post quantum authenticated key agreement protocol for the digital rights management system. In the proposed protocol, the server uses a random value instead of using fixed value chosen by the user, and it establishes a session key with the user. Moreover, this protocol needs to exchange just two messages that confirm the efficiency. The protocol has been proved secure in a random oracle model under ring learning with errors assumption. Moreover, the article contains an informal security discussion and a simulation using NS3 simulator.
引用
收藏
页码:26643 / 26660
页数:18
相关论文
共 37 条
  • [1] NFLlib: NTT-Based Fast Lattice Library
    Aguilar-Melchor, Carlos
    Barrier, Joris
    Guelton, Serge
    Guinet, Adrien
    Killijian, Marc-Olivier
    Lepoint, Tancrede
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 341 - 356
  • [2] A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment
    Chang, Chin-Chen
    Chang, Shih-Chang
    Yang, Jen-Ho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 972 - 984
  • [3] An efficient and reliable E-DRM scheme for mobile environments
    Chang, Chin-Chen
    Yang, Jen-Ho
    Wang, Da-Wei
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (09) : 6176 - 6181
  • [4] A secure and traceable E-DRM system based on mobile device
    Chen, Chin-Ling
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2008, 35 (03) : 878 - 886
  • [5] Dabra V, 2020, IEEE Syst J
  • [6] Dabra V, 2021, IEEE INT C SEMANT CO, P1
  • [7] An anonymous and secure biometric-based enterprise digital rights management system for mobile environment
    Das, Ashok Kumar
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3383 - 3404
  • [8] LWEDM: Learning with error based secure mobile digital rights management system
    Dharminder, Dharminder
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (02):
  • [9] LWESM: learning with error based secure communication in mobile devices using fuzzy extractor
    Dharminder, Dharminder
    Chandran, K. Prabhu
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (10) : 4089 - 4100
  • [10] LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication
    Dharminder, Dharminder
    Mishra, Dheerendra
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02):