A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System

被引:26
|
作者
Lee, Tian-Fu [1 ]
Chang, I-Pin [2 ,3 ]
Lin, Tsung-Hung [4 ]
Wang, Ching-Cheng [2 ]
机构
[1] Tzu Chi Univ, Dept Med Informat, Hualien 97004, Taiwan
[2] Natl Cheng Kung Univ, Inst Mfg Informat & Syst, Tainan 70101, Taiwan
[3] Kang Ning Univ, Dept Digital Applicat, Tainan 70970, Taiwan
[4] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung Cty 411, Taiwan
关键词
Integrated EPR information system; Network security; Password; Mutual authentication;
D O I
10.1007/s10916-013-9941-8
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.
引用
收藏
页数:7
相关论文
共 50 条
  • [11] Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards
    Wang, Ding
    Ma, Chun-guang
    Wu, Peng
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 114 - 121
  • [12] An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
    Das, Ashok Kumar
    Bruhadeshwar, Bezawada
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
  • [13] An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
    Ashok Kumar Das
    Bezawada Bruhadeshwar
    [J]. Journal of Medical Systems, 2013, 37
  • [14] Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
    He, Debiao
    Wang, Ding
    Wu, Shuhua
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 170 - 177
  • [15] A Provably Secure and Efficient Remote Password Authentication Scheme Using Smart Cards
    Shohaimay, Fairuz
    Ismail, Eddie Shahril
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03): : 6125 - 6145
  • [16] A Secure and Efficient Password-Based User Authentication Scheme for Hierarchical Wireless Sensor Networks
    Vorugunti, Chandra Sekhar
    Sarvabhatla, Mrudula
    [J]. PROCEEDINGS OF NINTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2013), 2014, 299 : 245 - 259
  • [17] A New Secure Password Authentication Scheme Using Smart Cards
    WANG Bangju1
    2. School of Science
    3. College of Information Science and Engineering
    Zhengzhou 450001
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 739 - 743
  • [18] Further improvement of an efficient password based remote user authentication scheme using smart cards
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 612 - 614
  • [19] Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    Ku, WC
    Chen, SM
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 204 - 207
  • [20] An efficient and secure multi-server password authentication scheme using smart cards
    Chang, CC
    Lee, JS
    [J]. 2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, : 417 - 422