Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS

被引:6
|
作者
Li, Chun-Ta [1 ]
Weng, Chi-Yao [2 ]
Lee, Cheng-Chi [3 ,4 ]
Wang, Chun-Cheng [1 ]
机构
[1] Tainan Univ Technol, Tainan 71002, Taiwan
[2] Natl Tsing Hua Univ, Hsinchu 30013, Taiwan
[3] Fu Jen Catholic Univ, New Taipei City 24205, Taiwan
[4] Asia Univ, Taichung 402, Taiwan
关键词
Authentication; Integrated EPRIS; Password; Quadratic residues; Smart card; User anonymity; MAP-BASED AUTHENTICATION; KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; CHAOTIC MAPS; SMART CARDS;
D O I
10.1016/j.procs.2015.05.008
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Remote user authentication has been widely used in the integrated electronic patient record information system (EPRIS) to protect the security and integrity of communication sessions between the login user and the medical server. Recently, Wen 17 presented the user authentication and user anonymity scheme based on the quadratic residues and claimed that his scheme is secure. However, we analyzed Wen's scheme and identified that Wen's scheme is vulnerable to password disclosure attack and does not provide efficiency in password change phase. As a result, in this paper, we propose an enhanced scheme for the integrated EPRIS with the aim to eliminate the weaknesses of Wen's scheme. By comparing the performance with other related schemes, our scheme not only resists several hard security attacks but also retains lower computational and communication costs. (C) 2015 Published by Elsevier B.V.
引用
收藏
页码:202 / 209
页数:8
相关论文
共 50 条
  • [31] SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments
    Lwamo, Nassoro M. R.
    Zhu, Liehuang
    Xu, Chang
    Sharif, Kashif
    Liu, Ximeng
    Zhang, Chuan
    [J]. INFORMATION SCIENCES, 2019, 477 : 369 - 385
  • [32] A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems
    Omid Mir
    Theo van der Weide
    Cheng-Chi Lee
    [J]. Journal of Medical Systems, 2015, 39
  • [33] A MORE SECURE AND EFFICIENT AUTHENTICATION SCHEME WITH ROAMING SERVICE AND USER ANONYMITY FOR MOBILE COMMUNICATIONS
    Li, Chun-Ta
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 69 - 76
  • [34] An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Fan, Chun-I
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (01): : 119 - 131
  • [35] Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
    Li, Xiong
    Niu, Jianwei
    Karuppiah, Marimuthu
    Kumari, Saru
    Wu, Fan
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
  • [36] An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
    Xu, Lili
    Wu, Fan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 245 - 260
  • [37] Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
    Xiong Li
    Jianwei Niu
    Marimuthu Karuppiah
    Saru Kumari
    Fan Wu
    [J]. Journal of Medical Systems, 2016, 40
  • [38] A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04): : 1069 - 1080
  • [39] A novel user authentication scheme with anonymity for wireless communications
    Niu, Jianwei
    Li, Xiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1467 - 1476
  • [40] A user friendly authentication scheme with anonymity for wireless communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Ha, Keum-Sook
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (03) : 356 - 364