LWEDM: Learning with error based secure mobile digital rights management system

被引:8
作者
Dharminder, Dharminder [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Math, Chennai, Tamil Nadu, India
来源
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES | 2021年 / 32卷 / 02期
关键词
SCHEME;
D O I
10.1002/ett.4199
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile multimedia security is essential to ensure a secure communication in industries, businesses, and organizations. Mobile multimedia is a new concept for an enterprise, where organizations need to be secure. In the last decade, a number of anonymous authentication protocols have been designed based on factorization and discrete logarithm assumptions. Shor's algorithm solves a number-theoretic assumption in polynomial time using postquantum computers that creates a trouble. However, learning with errors is an advanced hard assumption that cannot be solved by any known existing quantum algorithm. This inspires one to design an anonymous postquantum authentication protocol for the mobile digital rights management system. The protocol has been proved secure in a random oracle model under learning with errors assumption. Moreover, the article contributes an informal security discussion, an implementation using automated validation of internet security protocols and applications. The performance analysis ensures its efficiency even in the postquantum era.
引用
收藏
页数:14
相关论文
共 37 条
[1]   NFLlib: NTT-Based Fast Lattice Library [J].
Aguilar-Melchor, Carlos ;
Barrier, Joris ;
Guelton, Serge ;
Guinet, Adrien ;
Killijian, Marc-Olivier ;
Lepoint, Tancrede .
TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 :341-356
[2]  
Antony B, 2017, NUTRITIONAL MODULATORS OF PAIN IN THE AGING POPULATION, P183, DOI 10.1016/B978-0-12-805186-3.00015-1
[3]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[4]   A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment [J].
Chang, Chin-Chen ;
Chang, Shih-Chang ;
Yang, Jen-Ho .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) :972-984
[5]   An efficient and reliable E-DRM scheme for mobile environments [J].
Chang, Chin-Chen ;
Yang, Jen-Ho ;
Wang, Da-Wei .
EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (09) :6176-6181
[6]   A secure and traceable E-DRM system based on mobile device [J].
Chen, Chin-Ling .
EXPERT SYSTEMS WITH APPLICATIONS, 2008, 35 (03) :878-886
[7]   An anonymous and secure biometric-based enterprise digital rights management system for mobile environment [J].
Das, Ashok Kumar ;
Mishra, Dheerendra ;
Mukhopadhyay, Sourav .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3383-3404
[8]  
Dharminder D, 2020, J AMB INTEL HUM COMP, V11, P1
[9]   LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication [J].
Dharminder, Dharminder ;
Mishra, Dheerendra .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)
[10]  
Ding Jintai., 2012, IACR Cryptology ePrint Archive, V2012, P688