Strong Authentication Scheme for Telecare Medicine Information Systems
- 19 May 2011
- journal article
- Published by Springer Nature in Journal of Medical Systems
- Vol. 36 (4), 2609-2619
- https://doi.org/10.1007/s10916-011-9735-9
Abstract
The telecare medicine information system enables or supports health-care delivery services. A secure authentication scheme will thus be needed to safeguard data integrity, confidentiality, and availability. In this paper, we propose a generic construction of smart-card-based password authentication protocol and prove its security. The proposed framework is superior to previous schemes in three following aspects : (1) our scheme is a true two-factor authentication scheme. (2) our scheme can yield a forward secure two-factor authentication scheme with user anonymity when appropriately instantiated. (3) our scheme utilizes each user’s unique identity to accomplish the user authentication and does not need to store or verify others’s certificates. And yet, our scheme is still reasonably efficient and can yield such a concrete scheme that is even more efficient than previous schemes. Therefore the end result is more practical for the telecare medicine system.Keywords
This publication has 27 references indexed in Scilit:
- An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystemComputers & Security, 2008
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)Information Sciences, 2008
- Two-factor mutual authentication based on smart cards and passwordsJournal of Computer and System Sciences, 2008
- Cryptanalysis of simple three-party key exchange protocolComputers & Security, 2008
- Three weaknesses in a simple three-party key exchange protocolInformation Sciences, 2008
- Practical encrypted key agreement using passwordsWuhan University Journal of Natural Sciences, 2006
- A Secure Identification and Key agreement protocol with user Anonymity (SIKA)Computers & Security, 2006
- New efficient user identification and key distribution scheme providing enhanced securityComputers & Security, 2004
- Examining smart-card security under the threat of power analysis attacksIEEE Transactions on Computers, 2002
- Elliptic curve cryptosystemsMathematics of Computation, 1987