Research Article
Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
Table 1
Performance comparisons.
| | Our proposed scheme | Yang et al.’s scheme | Zhang et al.’s scheme |
| Registration phase | | | | | | | — | | | | |
| Login phase and key agreement phase | | | | | | | | | | | | | | | |
| Password update phase | | | | | | | — | | | | |
| Total | | | |
|
|