Skip to main content
Log in

Attacks on “a provably secure and efficient authentication scheme for access control in mobile pay-TV systems”

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Mobile pay-TV systems represent an application of important electronic commerce, providing mobile users with the multimedia services. In 2016, Farash and Attari employed the elliptic curves and bilinear pairing technologies to design a one-to-many authentication scheme for mobile pay-TV systems. They claimed that their scheme provides a high level of efficiency and can resist most attacks on mobile pay-TV systems. In this paper, we point out their scheme cannot achieve the fundamental requirement of authentication that is, the mutual authentication. In addition, their scheme still suffers from three security weaknesses.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Chen TH, Chen YC, Shih WK, Wei HW (2011) An efficient anonymous authentication protocol for mobile pay-TV. J Netw Comput Appl 34(4):1131–1137

    Article  Google Scholar 

  2. Coutrot F, Michon V (1989) A single conditional access system for satellite-cable and terrestrial TV. IEEE Trans Consum Electron 35:464–468

    Article  Google Scholar 

  3. Dolev D, Yao AC (1981) On the Security of Public Key Protocols. 22nd Annual Symposium on Foundations of Computer Science (SFCS’81):350–357

  4. DVB Standard (2005) IP Data Cast over DVB-H: Service Purchase and Protection (SPP)

  5. Farash MS, Attari MA (2016) A provably secure and efficient authentication scheme for access control in mobile pay-TV systems. Multimed Tool Appl 75(1):405–424

    Article  Google Scholar 

  6. Huang YL, Shish S, Ho FS, Wang JC (2004) Efficient key distribution schemes for secure media delivery in pay-TV systems. IEEE Trans Multimedia 6(5):760–769

    Article  Google Scholar 

  7. Huang X, Chu CK, Sun HM, Zhou J, Deng RH (2012) Enhanced authentication for commercial video services. Security and Communication Networks 5(11):1248–1259

    Article  Google Scholar 

  8. ITU-R Rec. 810 (1992) Conditional-Access Broadcasting System

  9. Khedr W (2013) On the security of anonymous authentication protocol for mobile pay-TV. J Inf Secur 4(4):225–233

    Google Scholar 

  10. Kim JY, Choi HK (2010) Improvements on Sun et al.’s conditional access system in pay-TV broadcasting systems. IEEE Trans Multimedia 12(4):337–340

    Article  Google Scholar 

  11. Kim H, Lee SW (2012) Anonymous authentication protocol for mobile pay-TV system. Communications in Computer and Information Science 339(5):471–478

    Article  Google Scholar 

  12. Lee NY, Chang CC, Lin CL, Hwang T (2000) Privacy and non-repudiation on pay-TV systems. IEEE Trans Consum Electron 46(1):20–27

    Article  Google Scholar 

  13. Song R, Korba L (2003) Pay-TV system with strong privacy and nonrepudiation protection. IEEE Trans Consum Electron 49(2):408–413

    Article  Google Scholar 

  14. Song R, Lyu MR (2001) Analysis of privacy and non-repudiation on pay-TV systems. IEEE Trans Consum Electron 47(4):729–733

    Article  Google Scholar 

  15. Sun HM, Leu MC (2009) An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 11(5):947–959

    Article  Google Scholar 

  16. Sun HM, Chen CM, Shieh CZ (2008) Flexible-pay-per-channel: a new model for content access control in pay-TV broadcasting systems. IEEE Trans Multimedia 10(6):1109–1120

    Article  Google Scholar 

  17. Wang SY, Laih CS (2008) Efficient key distribution for access control in pay-TV systems. IEEE Trans Multimedia 10(3):480–492

    Article  Google Scholar 

  18. Wang H, Qin B (2012) Improved one-to-many authentication scheme for access control in pay-TV systems. IET Inf Secur 6(4):281–290

    Article  Google Scholar 

  19. Wu HL, Chang CC, Sun CY (2016a) A secure authentication scheme with provable correctness for pay-TV systems. Security and Communication Networks. doi:10.1002/sec.1449

    Google Scholar 

  20. Wu HL, Chang CC, Sun CY (2016b) A secure authentication scheme with provable correctness for pay-TV systems. Security and Communication Networks 9(11):1577–1588

    Article  Google Scholar 

  21. Yeh LY, Huang JL (2013) A conditional access system with efficient key distribution and revocation for mobile pay-TV systems. ACM Trans Multimed Comput Commun Appl 9(3):18:1–18:20

  22. Yeh LY, Tsaur WJ (2012) A secure and efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 14(6):1690–1693

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, HL., Chang, CC. Attacks on “a provably secure and efficient authentication scheme for access control in mobile pay-TV systems”. Multimed Tools Appl 77, 1525–1535 (2018). https://doi.org/10.1007/s11042-017-4377-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4377-7

Keywords

Navigation