Research Article

Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

Algorithm 2

The login phase and the key agreement phase.
                                   
Login Phase:
 Input and
 Check
Key agreement Phase:
 Generate a random string
               Generate a random number
                 
             
                 
                 
                    
                    
                      Generate a random string
                    
                    
                      
             
              Generate a random number
             
 Check
   
 Check
 Generate a random number
     Check