Abstract
Mobile pay-TV systems represent an application of important electronic commerce, providing mobile users with the multimedia services. In 2016, Farash and Attari employed the elliptic curves and bilinear pairing technologies to design a one-to-many authentication scheme for mobile pay-TV systems. They claimed that their scheme provides a high level of efficiency and can resist most attacks on mobile pay-TV systems. In this paper, we point out their scheme cannot achieve the fundamental requirement of authentication that is, the mutual authentication. In addition, their scheme still suffers from three security weaknesses.

Similar content being viewed by others
References
Chen TH, Chen YC, Shih WK, Wei HW (2011) An efficient anonymous authentication protocol for mobile pay-TV. J Netw Comput Appl 34(4):1131–1137
Coutrot F, Michon V (1989) A single conditional access system for satellite-cable and terrestrial TV. IEEE Trans Consum Electron 35:464–468
Dolev D, Yao AC (1981) On the Security of Public Key Protocols. 22nd Annual Symposium on Foundations of Computer Science (SFCS’81):350–357
DVB Standard (2005) IP Data Cast over DVB-H: Service Purchase and Protection (SPP)
Farash MS, Attari MA (2016) A provably secure and efficient authentication scheme for access control in mobile pay-TV systems. Multimed Tool Appl 75(1):405–424
Huang YL, Shish S, Ho FS, Wang JC (2004) Efficient key distribution schemes for secure media delivery in pay-TV systems. IEEE Trans Multimedia 6(5):760–769
Huang X, Chu CK, Sun HM, Zhou J, Deng RH (2012) Enhanced authentication for commercial video services. Security and Communication Networks 5(11):1248–1259
ITU-R Rec. 810 (1992) Conditional-Access Broadcasting System
Khedr W (2013) On the security of anonymous authentication protocol for mobile pay-TV. J Inf Secur 4(4):225–233
Kim JY, Choi HK (2010) Improvements on Sun et al.’s conditional access system in pay-TV broadcasting systems. IEEE Trans Multimedia 12(4):337–340
Kim H, Lee SW (2012) Anonymous authentication protocol for mobile pay-TV system. Communications in Computer and Information Science 339(5):471–478
Lee NY, Chang CC, Lin CL, Hwang T (2000) Privacy and non-repudiation on pay-TV systems. IEEE Trans Consum Electron 46(1):20–27
Song R, Korba L (2003) Pay-TV system with strong privacy and nonrepudiation protection. IEEE Trans Consum Electron 49(2):408–413
Song R, Lyu MR (2001) Analysis of privacy and non-repudiation on pay-TV systems. IEEE Trans Consum Electron 47(4):729–733
Sun HM, Leu MC (2009) An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 11(5):947–959
Sun HM, Chen CM, Shieh CZ (2008) Flexible-pay-per-channel: a new model for content access control in pay-TV broadcasting systems. IEEE Trans Multimedia 10(6):1109–1120
Wang SY, Laih CS (2008) Efficient key distribution for access control in pay-TV systems. IEEE Trans Multimedia 10(3):480–492
Wang H, Qin B (2012) Improved one-to-many authentication scheme for access control in pay-TV systems. IET Inf Secur 6(4):281–290
Wu HL, Chang CC, Sun CY (2016a) A secure authentication scheme with provable correctness for pay-TV systems. Security and Communication Networks. doi:10.1002/sec.1449
Wu HL, Chang CC, Sun CY (2016b) A secure authentication scheme with provable correctness for pay-TV systems. Security and Communication Networks 9(11):1577–1588
Yeh LY, Huang JL (2013) A conditional access system with efficient key distribution and revocation for mobile pay-TV systems. ACM Trans Multimed Comput Commun Appl 9(3):18:1–18:20
Yeh LY, Tsaur WJ (2012) A secure and efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans Multimedia 14(6):1690–1693
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wu, HL., Chang, CC. Attacks on “a provably secure and efficient authentication scheme for access control in mobile pay-TV systems”. Multimed Tools Appl 77, 1525–1535 (2018). https://doi.org/10.1007/s11042-017-4377-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4377-7