Research Article
Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
Algorithm 2
The login phase and the key agreement phase.
| Login Phase: | Input and | | Check | Key agreement Phase: | Generate a random string | | | Generate a random number | | | | | | | Generate a random string | |
| | | Generate a random number | | Check | | Check | Generate a random number | | Check | | |
|