Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS

被引:6
|
作者
Li, Chun-Ta [1 ]
Weng, Chi-Yao [2 ]
Lee, Cheng-Chi [3 ,4 ]
Wang, Chun-Cheng [1 ]
机构
[1] Tainan Univ Technol, Tainan 71002, Taiwan
[2] Natl Tsing Hua Univ, Hsinchu 30013, Taiwan
[3] Fu Jen Catholic Univ, New Taipei City 24205, Taiwan
[4] Asia Univ, Taichung 402, Taiwan
关键词
Authentication; Integrated EPRIS; Password; Quadratic residues; Smart card; User anonymity; MAP-BASED AUTHENTICATION; KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; CHAOTIC MAPS; SMART CARDS;
D O I
10.1016/j.procs.2015.05.008
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Remote user authentication has been widely used in the integrated electronic patient record information system (EPRIS) to protect the security and integrity of communication sessions between the login user and the medical server. Recently, Wen 17 presented the user authentication and user anonymity scheme based on the quadratic residues and claimed that his scheme is secure. However, we analyzed Wen's scheme and identified that Wen's scheme is vulnerable to password disclosure attack and does not provide efficiency in password change phase. As a result, in this paper, we propose an enhanced scheme for the integrated EPRIS with the aim to eliminate the weaknesses of Wen's scheme. By comparing the performance with other related schemes, our scheme not only resists several hard security attacks but also retains lower computational and communication costs. (C) 2015 Published by Elsevier B.V.
引用
收藏
页码:202 / 209
页数:8
相关论文
共 50 条
  • [1] SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY
    Li, Chun-Ta
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (02): : 157 - 162
  • [2] An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
    Shin, Soobok
    Yeh, Hongjin
    Kim, Kangseok
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 674 - 683
  • [3] An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
    Soobok Shin
    Hongjin Yeh
    Kangseok Kim
    [J]. Peer-to-Peer Networking and Applications, 2015, 8 : 674 - 683
  • [4] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417
  • [5] A Secure Mobility Network Authentication Scheme Ensuring User Anonymity
    Chang, Ya-Fen
    Tai, Wei-Liang
    Hsu, Min-How
    [J]. SYMMETRY-BASEL, 2017, 9 (12):
  • [6] More secure smart card-based remote user password authentication scheme with user anonymity
    Kumari, Saru
    Khan, Muhammad Khurram
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2039 - 2053
  • [7] An Efficient and Secure User Authentication Scheme with Anonymity in Global Mobility Networks
    Madhusudhan, R.
    Suvidha, K. S.
    [J]. 2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 19 - 24
  • [8] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    [J]. 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [9] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [10] A secure authentication and key agreement scheme for roaming service with user anonymity
    Arshad, Hamed
    Rasoolzadegan, Abbas
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)