An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems
In 2012, Wang and Qin proposed an authentication mechanism in order to get access control for mobile pay-TV organization to enhance the Sun and Leu’s technique. Wang and Qin declared that their technique satisfies the security expectations or requirements intended for mobile pay-TV system. However,...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2017-06, Vol.76 (12), p.14225-14245 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 14245 |
---|---|
container_issue | 12 |
container_start_page | 14225 |
container_title | Multimedia tools and applications |
container_volume | 76 |
creator | Heydari, Mohammad Sajad Sadough, Seyed Mohammad Chaudhry, Shehzad Ashraf Farash, Mohammad Sabzinejad Mahmood, Khalid |
description | In 2012, Wang and Qin proposed an authentication mechanism in order to get access control for mobile pay-TV organization to enhance the Sun and Leu’s technique. Wang and Qin declared that their technique satisfies the security expectations or requirements intended for mobile pay-TV system. However, this work indicates that Wang and Qin’s scheme suffers from a nontrivial weakness. Successful impersonation attack is easily possible from an adversary who can impersonate mobile set (MS) to cheat the head-end system (HS). An adversary does not even need secret information to do so. As a remedy, we proposed an enhanced authentication technique for mobile pay-TV systems by taking a slight change in Wang and Qin’s scheme. The proposed scheme maintains the merits and covers the demerits of the previous schemes. |
doi_str_mv | 10.1007/s11042-016-3825-0 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2085594888</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2085594888</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-5d0b285ca711d9bfe714363ab444c8640ccd3998277019292d6f02b5edd30b6c3</originalsourceid><addsrcrecordid>eNp1kMtOwzAQRSMEEqXwAewssTaM7Th2llXFS6rEprC1HMehrpoHtgvK3-MQJFasZhbn3hmdLLsmcEsAxF0gBHKKgRSYScoxnGQLwgXDQlBymnYmAQsO5Dy7CGEPCeQ0X2TjqkOuHXz_aWvUdxbHHre6G5E-xp3tojM6ur5Dwexsa1Glww-HKndwndUeDdp5170H9OXiDk1FujpYFKw5ehdH1PQetX3CbUJHvH1DYQzRtuEyO2v0Idir37nMXh_ut-snvHl5fF6vNtgwUkTMa6io5EYLQuqyaqwgOSuYrvI8N7LIwZialaWkQgApaUnrogFacVvXDKrCsGV2M_em3z6ONkS174--SycVBcl5mUspE0Vmyvg-BG8bNXjXaj8qAmoyrGbDKolTk2EFKUPnTBgmBdb_Nf8f-ga7iX-F</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2085594888</pqid></control><display><type>article</type><title>An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems</title><source>Springer Nature - Complete Springer Journals</source><creator>Heydari, Mohammad ; Sajad Sadough, Seyed Mohammad ; Chaudhry, Shehzad Ashraf ; Farash, Mohammad Sabzinejad ; Mahmood, Khalid</creator><creatorcontrib>Heydari, Mohammad ; Sajad Sadough, Seyed Mohammad ; Chaudhry, Shehzad Ashraf ; Farash, Mohammad Sabzinejad ; Mahmood, Khalid</creatorcontrib><description>In 2012, Wang and Qin proposed an authentication mechanism in order to get access control for mobile pay-TV organization to enhance the Sun and Leu’s technique. Wang and Qin declared that their technique satisfies the security expectations or requirements intended for mobile pay-TV system. However, this work indicates that Wang and Qin’s scheme suffers from a nontrivial weakness. Successful impersonation attack is easily possible from an adversary who can impersonate mobile set (MS) to cheat the head-end system (HS). An adversary does not even need secret information to do so. As a remedy, we proposed an enhanced authentication technique for mobile pay-TV systems by taking a slight change in Wang and Qin’s scheme. The proposed scheme maintains the merits and covers the demerits of the previous schemes.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-016-3825-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Multimedia Information Systems ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2017-06, Vol.76 (12), p.14225-14245</ispartof><rights>Springer Science+Business Media New York 2016</rights><rights>Multimedia Tools and Applications is a copyright of Springer, (2016). All Rights Reserved.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-5d0b285ca711d9bfe714363ab444c8640ccd3998277019292d6f02b5edd30b6c3</citedby><cites>FETCH-LOGICAL-c316t-5d0b285ca711d9bfe714363ab444c8640ccd3998277019292d6f02b5edd30b6c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-016-3825-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-016-3825-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51298</link.rule.ids></links><search><creatorcontrib>Heydari, Mohammad</creatorcontrib><creatorcontrib>Sajad Sadough, Seyed Mohammad</creatorcontrib><creatorcontrib>Chaudhry, Shehzad Ashraf</creatorcontrib><creatorcontrib>Farash, Mohammad Sabzinejad</creatorcontrib><creatorcontrib>Mahmood, Khalid</creatorcontrib><title>An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>In 2012, Wang and Qin proposed an authentication mechanism in order to get access control for mobile pay-TV organization to enhance the Sun and Leu’s technique. Wang and Qin declared that their technique satisfies the security expectations or requirements intended for mobile pay-TV system. However, this work indicates that Wang and Qin’s scheme suffers from a nontrivial weakness. Successful impersonation attack is easily possible from an adversary who can impersonate mobile set (MS) to cheat the head-end system (HS). An adversary does not even need secret information to do so. As a remedy, we proposed an enhanced authentication technique for mobile pay-TV systems by taking a slight change in Wang and Qin’s scheme. The proposed scheme maintains the merits and covers the demerits of the previous schemes.</description><subject>Access control</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Multimedia Information Systems</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp1kMtOwzAQRSMEEqXwAewssTaM7Th2llXFS6rEprC1HMehrpoHtgvK3-MQJFasZhbn3hmdLLsmcEsAxF0gBHKKgRSYScoxnGQLwgXDQlBymnYmAQsO5Dy7CGEPCeQ0X2TjqkOuHXz_aWvUdxbHHre6G5E-xp3tojM6ur5Dwexsa1Glww-HKndwndUeDdp5170H9OXiDk1FujpYFKw5ehdH1PQetX3CbUJHvH1DYQzRtuEyO2v0Idir37nMXh_ut-snvHl5fF6vNtgwUkTMa6io5EYLQuqyaqwgOSuYrvI8N7LIwZialaWkQgApaUnrogFacVvXDKrCsGV2M_em3z6ONkS174--SycVBcl5mUspE0Vmyvg-BG8bNXjXaj8qAmoyrGbDKolTk2EFKUPnTBgmBdb_Nf8f-ga7iX-F</recordid><startdate>20170601</startdate><enddate>20170601</enddate><creator>Heydari, Mohammad</creator><creator>Sajad Sadough, Seyed Mohammad</creator><creator>Chaudhry, Shehzad Ashraf</creator><creator>Farash, Mohammad Sabzinejad</creator><creator>Mahmood, Khalid</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20170601</creationdate><title>An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems</title><author>Heydari, Mohammad ; Sajad Sadough, Seyed Mohammad ; Chaudhry, Shehzad Ashraf ; Farash, Mohammad Sabzinejad ; Mahmood, Khalid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-5d0b285ca711d9bfe714363ab444c8640ccd3998277019292d6f02b5edd30b6c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Access control</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Multimedia Information Systems</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Heydari, Mohammad</creatorcontrib><creatorcontrib>Sajad Sadough, Seyed Mohammad</creatorcontrib><creatorcontrib>Chaudhry, Shehzad Ashraf</creatorcontrib><creatorcontrib>Farash, Mohammad Sabzinejad</creatorcontrib><creatorcontrib>Mahmood, Khalid</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Heydari, Mohammad</au><au>Sajad Sadough, Seyed Mohammad</au><au>Chaudhry, Shehzad Ashraf</au><au>Farash, Mohammad Sabzinejad</au><au>Mahmood, Khalid</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2017-06-01</date><risdate>2017</risdate><volume>76</volume><issue>12</issue><spage>14225</spage><epage>14245</epage><pages>14225-14245</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>In 2012, Wang and Qin proposed an authentication mechanism in order to get access control for mobile pay-TV organization to enhance the Sun and Leu’s technique. Wang and Qin declared that their technique satisfies the security expectations or requirements intended for mobile pay-TV system. However, this work indicates that Wang and Qin’s scheme suffers from a nontrivial weakness. Successful impersonation attack is easily possible from an adversary who can impersonate mobile set (MS) to cheat the head-end system (HS). An adversary does not even need secret information to do so. As a remedy, we proposed an enhanced authentication technique for mobile pay-TV systems by taking a slight change in Wang and Qin’s scheme. The proposed scheme maintains the merits and covers the demerits of the previous schemes.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-016-3825-0</doi><tpages>21</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2017-06, Vol.76 (12), p.14225-14245 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2085594888 |
source | Springer Nature - Complete Springer Journals |
subjects | Access control Computer Communication Networks Computer Science Data Structures and Information Theory Multimedia Information Systems Special Purpose and Application-Based Systems |
title | An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T18%3A07%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20improved%20one-to-many%20authentication%20scheme%20based%20on%20bilinear%20pairings%20with%20provable%20security%20for%20mobile%20pay-TV%20systems&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Heydari,%20Mohammad&rft.date=2017-06-01&rft.volume=76&rft.issue=12&rft.spage=14225&rft.epage=14245&rft.pages=14225-14245&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-016-3825-0&rft_dat=%3Cproquest_cross%3E2085594888%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2085594888&rft_id=info:pmid/&rfr_iscdi=true |