A Trusted Authentication Protocol based on SDIO Smart Card for DRM

نویسندگان

  • Jian Wang
  • Zhiyong Zhang
  • Fei Xiang
  • Lili Zhang
  • Qingli Chen
چکیده

Terminals security vulnerabilities makes DRM researches to focus on trusted computing technology in recent years, however, no efficient and practical trusted authentication protocol is presented, especially with formal proof. To attest the integrity when access to the DRM server, the DRM client need perform mutual authentication and key agreement with the server first, and then use the sharing key to encrypt the integrity values. A novel trusted authentication protocol based on SDIO smart card is presented together with its formal security proof. The proposed protocol is composed of registration phase, login phase, identity authentication and key agreement phase, and integrity attestation phase. In contrast to other corrective schemes through attack resisting analysis and computational cost analysis, the proposed scheme is able to provide greater security and practicality to guarantee the trust attestation for DRM.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authenticating Secure Tokens Using Slow Memory Access

We present an authentication protocol that allows a token, such as a smart card, to authenticate itself to a back-end trusted computer system through an untrusted reader. This protocol relies on the fact that the token will only respond to queries slowly, and that the token owner will not sit patiently while the reader seems not to be working. This protocol can be used alone, with \dumb" memory...

متن کامل

User Authentication with Smart Cards in Trusted Computing Architecture

The introduction of smart cards into trusted architectures establishes a clear-cut separation between the roles and responsibilities of both platform and user. On one hand, the Trusted Platform Module (TPM) ensures the platform trustworthiness and secures platform credentials and secrets, while smart cards guarantee user identity and protect user credentials and access authorization. Starting f...

متن کامل

Applicability of Smart Cards to Network User Authentication

This paper addresses security issues associated with authenticating users to system services in distributed information systems. Its focus is the presentation of an approach for augmenting the Kerberos network user identification and authentication protocol through the integration of emerging smart card technology. Our conclusions indicate that the security of Kerberos-based network authenticat...

متن کامل

Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing

Only identities of the server and the user are authenticated in traditional smart cards based password authentication schemes, but the platform does not be verified, and which cannot provide enough protection on personal information of the user. A mutual authentication scheme based on smart cards and password is proposed under trusted computing, in which hash functions are used to authenticate ...

متن کامل

A Smart Card Based Solution for User-Centric Identity Management

This paper presents a prototype of a previously proposed user-centric identity management system using trusted modules. The trusted module, implemented using a smart card, can retrieve user attributes from identity providers and offer them to service providers, after authentication. This paper allows an evaluation of the practical feasibility of the identity management architecture and provides...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012