Skip to main content
Erschienen in: Journal of Medical Systems 5/2014

01.05.2014 | Transactional Processing Systems

Secure Verifier-Based Three-Party Authentication Schemes without Server Public Keys for Data Exchange in Telecare Medicine Information Systems

verfasst von: Tsung-Hung Lin, Tian-Fu Lee

Erschienen in: Journal of Medical Systems | Ausgabe 5/2014

Einloggen, um Zugang zu erhalten

Abstract

Secure verified-based three-party authentication scheme for data exchange in telecare medicine information systems enables two users only store their verifiers computed from their actual password in authentication server’s database. Then the authentication server can verify the users’ verifiers and help them to exchange electronic medical records or electronic health records securely and conveniently. This investigation presents an efficient and secure verified-based three-party authentication scheme for data exchange in telecare medicine information systems. The proposed scheme does not use server’s public keys and includes the key confirmation without extra numbers of messages and rounds. Compared to related verified-based approaches, the proposed scheme possesses higher security, has lower computational cost and fewer transmissions, and thus is suitable for the telecare medicine information systems.
Literatur
1.
Zurück zum Zitat Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.CrossRef Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.CrossRef
2.
Zurück zum Zitat Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef
3.
Zurück zum Zitat Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef
4.
Zurück zum Zitat He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef
5.
Zurück zum Zitat Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef
6.
Zurück zum Zitat Lee, T.-F., and Liu, C.-M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):9933, 2013. 1–8.CrossRef Lee, T.-F., and Liu, C.-M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):9933, 2013. 1–8.CrossRef
7.
Zurück zum Zitat Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):9919, 2013. 1–7.CrossRef Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):9919, 2013. 1–7.CrossRef
8.
Zurück zum Zitat Lee, T.-F., Chang, I.-P., Lin, T.-H., and Wang, C.-C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3):9941, 2013. 1–7.CrossRef Lee, T.-F., Chang, I.-P., Lin, T.-H., and Wang, C.-C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3):9941, 2013. 1–7.CrossRef
9.
Zurück zum Zitat Lee, T.-F., An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J. Med. Syst. 37(6):9985, 2013. 1–9.CrossRef Lee, T.-F., An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J. Med. Syst. 37(6):9985, 2013. 1–9.CrossRef
10.
Zurück zum Zitat Yeh, H.-T., Sun, H.-M., and Hwang, T., Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. Inf. Sci. Eng. 19(6):1059–1070, 2003. Yeh, H.-T., Sun, H.-M., and Hwang, T., Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. Inf. Sci. Eng. 19(6):1059–1070, 2003.
11.
Zurück zum Zitat Lee, S.-W., Kim, H.-S., and Yoo, K.-Y., Efficient verifier-based key agreement protocol for three parties without server’s public key. Appl. Math. Comput. 167(2):996–1003, 2005.CrossRefMATHMathSciNet Lee, S.-W., Kim, H.-S., and Yoo, K.-Y., Efficient verifier-based key agreement protocol for three parties without server’s public key. Appl. Math. Comput. 167(2):996–1003, 2005.CrossRefMATHMathSciNet
12.
Zurück zum Zitat Lee, T.-F., Liu, J. L., Sung, M.-J., Yang, S.-B., and Chen, C.-M., Communication-efficient three-party protocols for authentication and key agreement. Comput. Math. Appl. 58:641–648, 2009.CrossRefMATHMathSciNet Lee, T.-F., Liu, J. L., Sung, M.-J., Yang, S.-B., and Chen, C.-M., Communication-efficient three-party protocols for authentication and key agreement. Comput. Math. Appl. 58:641–648, 2009.CrossRefMATHMathSciNet
13.
Zurück zum Zitat Wang, R.-C., and Mo, K.-R., Security enhancement on efficient verifier-based key agreement protocol for three parties without server’s public key. Int. Math. Forum 1(20):965–972, 2006.MATHMathSciNet Wang, R.-C., and Mo, K.-R., Security enhancement on efficient verifier-based key agreement protocol for three parties without server’s public key. Int. Math. Forum 1(20):965–972, 2006.MATHMathSciNet
14.
Zurück zum Zitat Kwon, J.-O., Jeong, I.-R., Sakurai, K., and Lee, D.-H., Efficient verifier-based password-authenticated key exchange in the three-party setting. Comput. Stand. Interfaces 29(5):513–520, 2007.CrossRef Kwon, J.-O., Jeong, I.-R., Sakurai, K., and Lee, D.-H., Efficient verifier-based password-authenticated key exchange in the three-party setting. Comput. Stand. Interfaces 29(5):513–520, 2007.CrossRef
16.
Zurück zum Zitat Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. Proc. of Advances in Cryptology–Eurocrypt 2000. Lect. Notes Comput. Sci 1807: 122–138, 2000. Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. Proc. of Advances in Cryptology–Eurocrypt 2000. Lect. Notes Comput. Sci 1807: 122–138, 2000.
17.
Zurück zum Zitat Boyko, V., MacKenzie, P., and Patel, S., Provably secure password based authenticated key exchange protocols using Diffie-Hellman. Proc. of Advances in Cryptology–Eurocrypt 2000. Lect. Notes Comput. Sci 1807: 156–171, 2000. Boyko, V., MacKenzie, P., and Patel, S., Provably secure password based authenticated key exchange protocols using Diffie-Hellman. Proc. of Advances in Cryptology–Eurocrypt 2000. Lect. Notes Comput. Sci 1807: 156–171, 2000.
18.
Zurück zum Zitat Abdalla, M., Fouque, P. A., and Pointcheval, D., Password-based authenticated key exchange in the three-party setting. Lect. Notes Comput. Sci 3386:65–84, 2005.CrossRefMathSciNet Abdalla, M., Fouque, P. A., and Pointcheval, D., Password-based authenticated key exchange in the three-party setting. Lect. Notes Comput. Sci 3386:65–84, 2005.CrossRefMathSciNet
19.
Zurück zum Zitat Abdalla, M., and Pointcheval, D., Simple password-based authenticated key protocols. Topics in Cryptology–CT-RSA 2005. Lect. Notes Comput. Sci 3376:191–208, 2005.CrossRefMathSciNet Abdalla, M., and Pointcheval, D., Simple password-based authenticated key protocols. Topics in Cryptology–CT-RSA 2005. Lect. Notes Comput. Sci 3376:191–208, 2005.CrossRefMathSciNet
22.
Zurück zum Zitat Lee, T.-F., and Hwang, T., Simple password-based three-party authenticated key exchange without server public keys. Inf. Sci. 180(9):1702–1714, 2010.CrossRefMATH Lee, T.-F., and Hwang, T., Simple password-based three-party authenticated key exchange without server public keys. Inf. Sci. 180(9):1702–1714, 2010.CrossRefMATH
Metadaten
Titel
Secure Verifier-Based Three-Party Authentication Schemes without Server Public Keys for Data Exchange in Telecare Medicine Information Systems
verfasst von
Tsung-Hung Lin
Tian-Fu Lee
Publikationsdatum
01.05.2014
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 5/2014
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-014-0030-4

Weitere Artikel der Ausgabe 5/2014

Journal of Medical Systems 5/2014 Zur Ausgabe