Compliance with HIPAA and GDPR in Certificateless-Based Authenticated Key Agreement Using Extended Chaotic Maps

被引:6
|
作者
Lee, Tian-Fu [1 ]
Chang, I-Pin [2 ]
Su, Guo-Jun [3 ]
机构
[1] Tzu Chi Univ, Dept Med Informat, Hualien 97004, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Ind Management, Taipei 106335, Taiwan
[3] Inst Informat Ind, Taipei 10622, Taiwan
关键词
HIPAA; GDPR; authentication; key agreement; information security; MUTUAL AUTHENTICATION; PROTOCOL; SECURITY; SCHEME; CRYPTANALYSIS; LIGHTWEIGHT; MANAGEMENT;
D O I
10.3390/electronics12051108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronically protected health information is held in computerized healthcare records that contain complete healthcare information and are easily shareable or retrieved by various health care providers via the Internet. The two most important concerns regarding their use involve the security of the Internet and the privacy of patients. To protect the privacy of patients, various regions of the world maintain privacy standards. These are set, for example, by the Health Insurance Portability and Accountability Act (HIPAA) in the United States and the General Data Protection Regulation (GDPR) in Europe. Most recently developed authenticated key agreement schemes for HIPAA and GDPR privacy/security involve modular exponential computations or scalar multiplications on elliptic curves to provide higher security, but they are computationally heavy and therefore costly to implement. Recent studies have shown that cryptosystems that use modular exponential computation and scalar multiplication on elliptic curves are less efficient than those based on Chebyshev chaotic maps. Therefore, this investigation develops a secure and efficient non-certificate-based authenticated key agreement scheme that uses lightweight operations, including Chebyshev chaotic maps and hash operations. The proposed scheme overcomes the limitations of alternative schemes, is computationally more efficient, and provides more functionality. The proposed scheme complies with the privacy principles of HIPAA and GDPR.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] An authenticated key agreement protocol based on extended chaotic maps
    Jian, Shu
    ACTA PHYSICA SINICA, 2014, 63 (05) : 050507
  • [2] Certificateless-based two-party authenticated key agreement protocol
    Hou, Meng-Bo
    Xu, Qiu-Liang
    Guo, Shan-Qing
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (SUPPL. 1): : 321 - 329
  • [3] An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password
    Li, Xiong
    Liao, Junguo
    Liang, Wei
    Zhao, Jingqiang
    CLOUD COMPUTING AND SECURITY, ICCCS 2016, PT I, 2016, 10039 : 421 - 431
  • [4] Secure Certificateless-Based Authenticated Key Agreement Protocol in the Client-Server Setting
    Hou Meng-bo
    Xu Qiu-liang
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 960 - 965
  • [5] Certificateless-based two-party authenticated Key agreement Protocols in a Multiple PKG Environment
    Pan Jin
    Liu Xiaoqiong
    Xie Minghui
    Liu Qiong
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2364 - 2367
  • [6] Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps
    Lee, Tian-Fu
    Hsiao, Chia-Hung
    Hwang, Shi-Han
    Lin, Tsung-Hung
    PLOS ONE, 2017, 12 (07):
  • [7] A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks
    Ren, Huimin
    Kim, Suhyun
    Seo, Daehee
    Lee, Imyeong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (05): : 1687 - 1707
  • [8] CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks
    Li, Yanping
    Chen, Weifeng
    Cai, Zhiping
    Fang, Yuguang
    WIRELESS NETWORKS, 2016, 22 (08) : 2523 - 2535
  • [9] CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks
    Yanping Li
    Weifeng Chen
    Zhiping Cai
    Yuguang Fang
    Wireless Networks, 2016, 22 : 2523 - 2535
  • [10] Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks
    Lee, Tian-Fu
    SENSORS, 2015, 15 (07) : 14960 - 14980