Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS

被引:6
|
作者
Li, Chun-Ta [1 ]
Weng, Chi-Yao [2 ]
Lee, Cheng-Chi [3 ,4 ]
Wang, Chun-Cheng [1 ]
机构
[1] Tainan Univ Technol, Tainan 71002, Taiwan
[2] Natl Tsing Hua Univ, Hsinchu 30013, Taiwan
[3] Fu Jen Catholic Univ, New Taipei City 24205, Taiwan
[4] Asia Univ, Taichung 402, Taiwan
关键词
Authentication; Integrated EPRIS; Password; Quadratic residues; Smart card; User anonymity; MAP-BASED AUTHENTICATION; KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; CHAOTIC MAPS; SMART CARDS;
D O I
10.1016/j.procs.2015.05.008
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Remote user authentication has been widely used in the integrated electronic patient record information system (EPRIS) to protect the security and integrity of communication sessions between the login user and the medical server. Recently, Wen 17 presented the user authentication and user anonymity scheme based on the quadratic residues and claimed that his scheme is secure. However, we analyzed Wen's scheme and identified that Wen's scheme is vulnerable to password disclosure attack and does not provide efficiency in password change phase. As a result, in this paper, we propose an enhanced scheme for the integrated EPRIS with the aim to eliminate the weaknesses of Wen's scheme. By comparing the performance with other related schemes, our scheme not only resists several hard security attacks but also retains lower computational and communication costs. (C) 2015 Published by Elsevier B.V.
引用
收藏
页码:202 / 209
页数:8
相关论文
共 50 条
  • [21] A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks
    Marimuthu Karuppiah
    R. Saravanan
    [J]. Wireless Personal Communications, 2015, 84 : 2055 - 2078
  • [22] RSA Based Two-Factor Remote User Authentication Scheme with User Anonymity
    Chandrakar, Preeti
    Om, Hari
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 318 - 324
  • [23] A remote authentication scheme preserving user anonymity
    Chien, HY
    Chen, CH
    [J]. AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 245 - 248
  • [24] An Energy Efficient Remote User Authentication Scheme Preserving User Anonymity
    Bapana, Surekha
    Narayana, K. Lakshmi
    Vorugunti, Chandra Sekhar
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1296 - 1301
  • [25] An Improved User Authentication and Key Agreement Scheme Providing User Anonymity
    Ya-Fen Chang and Pei-Yu Chang Department of Computer Science and Information Engineering
    [J]. Journal of Electronic Science and Technology, 2011, 9 (04) : 352 - 358
  • [26] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689
  • [27] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
  • [28] A Secure Remote User Authentication Scheme
    Park, Ji-Hye
    Yim, Seong Jun
    Chang, Jik Hyun
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 368 - 373
  • [29] A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems
    Mir, Omid
    van der Weide, Theo
    Lee, Cheng-Chi
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (09)
  • [30] SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments
    Lwamo, Nassoro M. R.
    Zhu, Liehuang
    Xu, Chang
    Sharif, Kashif
    Liu, Ximeng
    Zhang, Chuan
    [J]. INFORMATION SCIENCES, 2019, 477 : 369 - 385