dc.contributor.author | Hussain, Sajid | |
dc.contributor.author | Bin Zikria, Yousaf | |
dc.contributor.author | Mallah, Ghulam Ali | |
dc.contributor.author | Chen, Chien-Ming | |
dc.contributor.author | Alshehri, Mohammad Dahman | |
dc.contributor.author | Ishmanov, Farruh | |
dc.contributor.author | Chaudhry, Shehzad Ashraf | |
dc.date.accessioned | 2023-10-06T07:39:04Z | |
dc.date.available | 2023-10-06T07:39:04Z | |
dc.date.issued | 2022 | en_US |
dc.identifier.issn | 1530-8669 | |
dc.identifier.issn | 1530-8677 | |
dc.identifier.uri | https://hdl.handle.net/11363/5778 | |
dc.description.abstract | With the increasing number and popularity of digital content, the management of digital access rights has become an utmost
important field. Through digital rights management systems (DRM-S), access to digital contents can be defined and for this, an
efficient and secure authentication scheme is required. The DRM authentication schemes can be used to give access or restrict
access to digital content. Very recently in 2020, Yu et al. proposed a symmetric hash and xor-based DRM and termed their
system to achieve both security and performance efficiency. Contrarily, in this study, we argue that their scheme has several
issues including nonresistance to privileged insider and impersonation attacks. Moreover, it is also to show in this study that
their scheme has an incorrect authentication phase and due to this incorrectness, the scheme of Yu et al. lacks user scalability.
An improved scheme is then proposed to counter the insecurities and incorrectness of the scheme of Yu et al. We prove the
security of the proposed scheme using BAN logic. For a clear picture of the security properties, we also provide a textual
discussion on the robustness of the proposed scheme. Moreover, due to the usage of symmetric key-based hash functions, the
proposed scheme has a comparable performance efficiency. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND | en_US |
dc.relation.isversionof | 10.1155/2022/1041880 | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.title | An Improved Authentication Scheme for Digital Rights Management System | en_US |
dc.type | article | en_US |
dc.relation.ispartof | Wireless Communications and Mobile Computing | en_US |
dc.department | Mühendislik ve Mimarlık Fakültesi | en_US |
dc.authorid | https://orcid.org/0000-0003-1540-4940 | en_US |
dc.authorid | https://orcid.org/0000-0002-6570-5306 | en_US |
dc.authorid | https://orcid.org/0000-0003-3428-9802 | en_US |
dc.authorid | https://orcid.org/0000-0002-6502-472X | en_US |
dc.authorid | https://orcid.org/0000-0001-9520-330X | en_US |
dc.authorid | https://orcid.org/0000-0002-7378-8009 | en_US |
dc.authorid | https://orcid.org/0000-0002-9321-6956 | en_US |
dc.identifier.volume | 2022 | en_US |
dc.identifier.startpage | 1 | en_US |
dc.identifier.endpage | 11 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.institutionauthor | Chaudhry, Shehzad Ashraf | |