Skip to main content
Log in

An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In 2012, Wang and Qin proposed an authentication mechanism in order to get access control for mobile pay-TV organization to enhance the Sun and Leu’s technique. Wang and Qin declared that their technique satisfies the security expectations or requirements intended for mobile pay-TV system. However, this work indicates that Wang and Qin’s scheme suffers from a nontrivial weakness. Successful impersonation attack is easily possible from an adversary who can impersonate mobile set (MS) to cheat the head-end system (HS). An adversary does not even need secret information to do so. As a remedy, we proposed an enhanced authentication technique for mobile pay-TV systems by taking a slight change in Wang and Qin’s scheme. The proposed scheme maintains the merits and covers the demerits of the previous schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Bayat M, Farash M-S, Movahed A (2010) A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card. In: IEEE/IFIP international conference on embedded and ubiquitous computing (EUC), vol 2010, pp 578–582

  2. Chen T-H, Chen Y-C, Shih W-K, Wei H-W (2011) An efficient anonymous authentication protocol for mobile pay-TV. J Netw Comput Appl 34(4):1131–1137

    Article  Google Scholar 

  3. Conditional-Access Broadcasting System (1992) ITU-R Rec. 810

  4. Coutrot F, Michon V (1989) A single conditional access system for satellite-cable and terrestrial TV. Trans Consum Electron 35(3):464–468

    Article  Google Scholar 

  5. Digital Video Broadcasting (DVB): IP Datacast over DVB-H: Service Purchase and Protection: ETSI TS 102 474 v1.1.1 Std. Nov. 2007

  6. Farash M-S, Attari M-A (2013) Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. ISC Int J Inf Secur 5(1):18–43

    Google Scholar 

  7. Farash M-S, Attari M-A (2013) An enhanced authenticated key agreement for session initiation protocol. Inf Technol Control 42(4):333–342

    Google Scholar 

  8. Farash M-S, Attari M-A (2013) Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dyn 76(2):1203–1213

    Article  MathSciNet  MATH  Google Scholar 

  9. Farash M-S, Attari M-A (2014) A pairing-free ID-based key agreement protocol with different PKGs. Int J Netw Secur 16(2):143–148

    Google Scholar 

  10. Farash M-S, Attari M-A (2014) Secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J. Supercomput. 69(1):395–411

    Article  Google Scholar 

  11. Farash M-S, Attari M-A (2014) An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn 77(1–2):399–411

    Article  MathSciNet  MATH  Google Scholar 

  12. Farash M-S, Attari M-A (2014) An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems. Inf Technol Control 43(2):143–150

    Google Scholar 

  13. Farash M-S, Attari M-A (2014) Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput. doi:10.1007/s11227-014-1272-0

    Google Scholar 

  14. Farash M-S, Attari M-A (2014) An efficient client-client password-based authentication scheme with provable security. J Supercomput. doi:10.1007/s11227-014-1273-z

    Google Scholar 

  15. Farash M-S, Bayat M, Attari M-A (2011) Vulnerability of two multiple-key agreement protocols. Comput Electr Eng 37(2):199–204

    Article  MATH  Google Scholar 

  16. Farash M-S, Attari M-A, Bayat M (2012) A Certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings. IACSIT Int J Eng Technol 4(3):321–325

    Article  Google Scholar 

  17. Farash M-S, Attari M-A, Atani R-E, Jami M (2013) A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput Electr Eng 39(2):530–541

    Article  Google Scholar 

  18. Huang X, Chu C-K, Sun H-M, Zhou J, Deng R-H (2012) Enhanced authentication for commercial video services. Secur Commun Netw 5(11):1248–1259

    Article  Google Scholar 

  19. Kilinc H, Yanik T (2014) A survey of sip authentication and key agreement schemes. Communications Surveys Tutorials, IEEE 16(2):10051023. doi:10.1109/SURV.2013.091513.00050

    Article  Google Scholar 

  20. Kim J-Y, Choi H-K (2010) Improvements on Sun et al.’s conditional access system in pay-TV broadcasting systems. IEEE Trans Multimedia 12(4):337–340

    Article  Google Scholar 

  21. Lee N, Chang C, Lin C, Hwang T (2000) Privacy and non-repudiation on pay-TV systems. IEEE Trans Consum Electr 46(1):20–27

    Article  Google Scholar 

  22. Liu X, Zhang Y (2013) A privacy-preserving acceleration authentication protocol for mobile pay-TV systems. Secur Commun Netw 6(3):361–372

    Article  MathSciNet  Google Scholar 

  23. Pointcheval D, Stern J (1996) Security proofs for signature schemes. In: Maurer UM (ed) EUROCRYPT 1996. LNCS, vol 1070. Springer, Heidelberg, pp 387–398

  24. Song R, Korba L (2003) Pay-TV system with strong privacy and nonrepudiation protection. IEEE Trans Consum Electr 49(2):408–413

    Article  Google Scholar 

  25. Sun H-M, Leu M-C (2009) An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 11(5):947–959

    Article  Google Scholar 

  26. Sun H-M, Chen C-M, Shieh C-Z (2008) Flexible-pay-per-channel: a new model for content access control in pay-TV broadcasting systems. IEEE Trans Multimedia 10 (6):1109– 1120

    Article  Google Scholar 

  27. Wang S-Y, Laih C-S (2008) Efficient key distribution for access control in pay-TV systems. IEEE Trans Multimedia 10(3):480–492

    Article  Google Scholar 

  28. Wang H, Qin B (2012) Improved one-to-many authentication scheme for access control in pay-TV systems. IET Inform Secur 6(4):281–290

    Article  Google Scholar 

  29. Yang J-H, Chang C-C (2009) An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput Secur 28(3–4):138–143

    Article  Google Scholar 

  30. Yeh L-Y, Tsaur W (2012) A secure and efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 14(6):1690–1693

    Article  Google Scholar 

  31. Yeung S-F, Lui JCS, Yau DKY (2005) A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation. IEEE Trans Multimedia 7(2):330– 338

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Sabzinejad Farash.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Heydari, M., Sajad Sadough, S.M., Chaudhry, S.A. et al. An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems. Multimed Tools Appl 76, 14225–14245 (2017). https://doi.org/10.1007/s11042-016-3825-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3825-0

Keywords

Navigation