Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS

被引:6
|
作者
Li, Chun-Ta [1 ]
Weng, Chi-Yao [2 ]
Lee, Cheng-Chi [3 ,4 ]
Wang, Chun-Cheng [1 ]
机构
[1] Tainan Univ Technol, Tainan 71002, Taiwan
[2] Natl Tsing Hua Univ, Hsinchu 30013, Taiwan
[3] Fu Jen Catholic Univ, New Taipei City 24205, Taiwan
[4] Asia Univ, Taichung 402, Taiwan
关键词
Authentication; Integrated EPRIS; Password; Quadratic residues; Smart card; User anonymity; MAP-BASED AUTHENTICATION; KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; CHAOTIC MAPS; SMART CARDS;
D O I
10.1016/j.procs.2015.05.008
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Remote user authentication has been widely used in the integrated electronic patient record information system (EPRIS) to protect the security and integrity of communication sessions between the login user and the medical server. Recently, Wen 17 presented the user authentication and user anonymity scheme based on the quadratic residues and claimed that his scheme is secure. However, we analyzed Wen's scheme and identified that Wen's scheme is vulnerable to password disclosure attack and does not provide efficiency in password change phase. As a result, in this paper, we propose an enhanced scheme for the integrated EPRIS with the aim to eliminate the weaknesses of Wen's scheme. By comparing the performance with other related schemes, our scheme not only resists several hard security attacks but also retains lower computational and communication costs. (C) 2015 Published by Elsevier B.V.
引用
收藏
页码:202 / 209
页数:8
相关论文
共 50 条
  • [41] User authentication scheme preserving anonymity for ubiquitous devices
    Djellali, Benchaa
    Belarbi, Kheira
    Chouarfia, Abdallah
    Lorenz, Pascal
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3131 - 3141
  • [42] A Remote User Authentication Scheme with Anonymity for Mobile Devices
    Shin, Soobok
    Kim, Kangseok
    Kim, Ki-Hyung
    Yeh, Hongjin
    [J]. INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9
  • [43] An Efficient Remote User Authentication Scheme with Strong Anonymity
    Liu, Yanfei
    Zhao, Ziming
    Li, Hui
    Luo, Qun
    Yang, Yixian
    [J]. PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS, 2008, : 180 - 185
  • [44] Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Xiong, Hu
    Wang, Xiaofeng
    Li, Fagen
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 256 - 258
  • [45] Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain
    Kang, Dongwoo
    Jung, Jaewook
    Mun, Jongho
    Lee, Donghoon
    Choi, Younsung
    Won, Dongho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1462 - 1476
  • [46] User anonymity-based secure authentication protocol for telemedical server systems
    Gupta, Sunil
    Arya, Pradeep Kumar
    Sharma, Hitesh Kumar
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 20 (1-2) : 199 - 219
  • [47] A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
    Sammoud, Amal
    Chalouf, Mohamed Aymen
    Hamdi, Omessaad
    Montavont, Nicolas
    Bouallegue, Ammar
    [J]. 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1916 - 1921
  • [48] A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    Das, Ashok Kumar
    Khan, Muhammad Khurram
    Karuppiah, Marimuthu
    Baliyan, Renuka
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3527 - 3542
  • [49] More secure remote user authentication scheme
    Kim, Sang-Kyun
    Chung, Min Gyo
    [J]. COMPUTER COMMUNICATIONS, 2009, 32 (06) : 1018 - 1021
  • [50] A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems
    Ashok Kumar Das
    [J]. Journal of Medical Systems, 2015, 39