Skip to main content
Erschienen in: Journal of Medical Systems 5/2013

01.10.2013 | Original Paper

A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce

verfasst von: Amit K. Awasthi, Keerti Srivastava

Erschienen in: Journal of Medical Systems | Ausgabe 5/2013

Einloggen, um Zugang zu erhalten

Abstract

In recent years, the increased availability of lower-cost telecommunications systems and customized patients monitoring devices made it possible to bring the advantages of telemedicine directly into the patient’s home. These telecare medicine information systems enable health-care delivery services. These systems are moving towards an environment where automated patient medical records and electronically interconnected telecare facilities are prevalent. Authentication, security, patient’s privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). A secure authentication scheme will be required to achieve these goals. Many schemes based on cryptography have been proposed to achieve the goals. However, many schemes are vulnerable to various attacks, and are neither efficient, nor user friendly. Specially, in terms of efficiency, some schemes are resulting in high time cost. In this paper we propose a new authentication scheme that is using the precomputing to avoid the time-consuming exponential computations. Finally, it is shown to be more secure and practical for telecare medicine environments.
Literatur
1.
Zurück zum Zitat Menezes, A. J., Oorschot, P. C., and Vanstone, S. A., Handbook of applied cryptography. CRC Press, 1997. Menezes, A. J., Oorschot, P. C., and Vanstone, S. A., Handbook of applied cryptography. CRC Press, 1997.
2.
Zurück zum Zitat Chang, C. C., and Hwang, K. F., Some forgery attack on a remote user authentication scheme using smart card. Informatica 14(3):289–294, 2003.MathSciNetMATH Chang, C. C., and Hwang, K. F., Some forgery attack on a remote user authentication scheme using smart card. Informatica 14(3):289–294, 2003.MathSciNetMATH
3.
Zurück zum Zitat Chan C. K., and Cheng, L. M., Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):992–993, 2000.CrossRef Chan C. K., and Cheng, L. M., Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):992–993, 2000.CrossRef
4.
Zurück zum Zitat Deng, S., Xiao, D., Liao, X., One-way hash function construction based on chaotic map with changeable parameter. Chaos, Solitons Fractals 24:65–71, 2005.MathSciNetMATH Deng, S., Xiao, D., Liao, X., One-way hash function construction based on chaotic map with changeable parameter. Chaos, Solitons Fractals 24:65–71, 2005.MathSciNetMATH
5.
Zurück zum Zitat Sun, H. M., An efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):958–961, 2000.CrossRef Sun, H. M., An efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):958–961, 2000.CrossRef
6.
Zurück zum Zitat Yeh, H. T., Sun, H. M., and Hsieh, B. T., Security of a remote user authentication scheme using smart cards. IEICE Trans. Commun. B(1)(E87):192–194, 2004. Yeh, H. T., Sun, H. M., and Hsieh, B. T., Security of a remote user authentication scheme using smart cards. IEICE Trans. Commun. B(1)(E87):192–194, 2004.
7.
Zurück zum Zitat Hwang, T., Chen, Y., and Laih, C.-S., Non-interactive password authentications without password tables. In: Computer and Communication Systems, 1990. IEEE TENCON’90., 1990 IEEE Region 10 Conference on, Vol. 1, pages 429–431, 1990. Hwang, T., Chen, Y., and Laih, C.-S., Non-interactive password authentications without password tables. In: Computer and Communication Systems, 1990. IEEE TENCON’90., 1990 IEEE Region 10 Conference on, Vol. 1, pages 429–431, 1990.
8.
Zurück zum Zitat Liu S., and Sun, L., Cryptographic pseudo random sequence from spatial chaotic map. Chaos, Solitions Fractals 41:2216–2229, 2009.CrossRef Liu S., and Sun, L., Cryptographic pseudo random sequence from spatial chaotic map. Chaos, Solitions Fractals 41:2216–2229, 2009.CrossRef
9.
Zurück zum Zitat Lamport, L., Password authentication with insecure communication. Commun. ACM 24:770–772, 1981.CrossRef Lamport, L., Password authentication with insecure communication. Commun. ACM 24:770–772, 1981.CrossRef
10.
Zurück zum Zitat Sandirigama, M., Shimizu, A., and Noda, M. T., Simple and secure password authentication protocol(sas). IEICE Trans. Commun. B(6)(E83):1363–1365, 2000. Sandirigama, M., Shimizu, A., and Noda, M. T., Simple and secure password authentication protocol(sas). IEICE Trans. Commun. B(6)(E83):1363–1365, 2000.
11.
Zurück zum Zitat Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart card. IEEE Trans. Consum. Electron. 46(1):28–30, 2000.CrossRef Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart card. IEEE Trans. Consum. Electron. 46(1):28–30, 2000.CrossRef
12.
Zurück zum Zitat Haller, N. H., The s/key(tm) one time password system. In: Proceedings Internet Society Symposium on Network and Distributed System Seurity, pages 151-158, 1994. Haller, N. H., The s/key(tm) one time password system. In: Proceedings Internet Society Symposium on Network and Distributed System Seurity, pages 151-158, 1994.
13.
Zurück zum Zitat Elgamal, T., A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Inf. Theory 31(4):469–472, 1985.CrossRef Elgamal, T., A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Inf. Theory 31(4):469–472, 1985.CrossRef
14.
Zurück zum Zitat Chen T. H., and Lee, W. B., A new method for using hash function to solve remote user authentication. Comput. Electr. Eng. 34(1):53–62, 2008.MathSciNetCrossRefMATH Chen T. H., and Lee, W. B., A new method for using hash function to solve remote user authentication. Comput. Electr. Eng. 34(1):53–62, 2008.MathSciNetCrossRefMATH
15.
Zurück zum Zitat Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef
Metadaten
Titel
A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
verfasst von
Amit K. Awasthi
Keerti Srivastava
Publikationsdatum
01.10.2013
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 5/2013
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-013-9964-1

Weitere Artikel der Ausgabe 5/2013

Journal of Medical Systems 5/2013 Zur Ausgabe