Computation-transferable authenticated key agreement protocol for smart healthcare

被引:16
|
作者
Wang, Wenming [1 ,2 ]
Huang, Haiping [1 ,3 ]
Xiao, Fu [1 ,3 ]
Li, Qi [1 ,3 ]
Xue, Lingyan [1 ,3 ]
Jiang, Jiansheng [2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210003, Jiangsu, Peoples R China
[2] Anqing Normal Univ, Univ Key Lab Intelligent Percept & Comp Anhui Pro, Anqing 246011, Anhui, Peoples R China
[3] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Smart healthcare; Authenticated key agreement (AKA); Security; Privacy; MUTUAL AUTHENTICATION; USER AUTHENTICATION; SCHEME; CRYPTOGRAPHY; INTERNET; THINGS;
D O I
10.1016/j.sysarc.2021.102215
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smart healthcare plays an important role in contemporary society while its security and privacy issues remain inevitable challenges. Authenticated key agreement (AKA) mechanism, as the foundation of secure communication, has been recognized as an important measure for solving this problem. Most existing AKA protocols utilize cloud-based centralized architecture, data privacy and security can be exposed easily once the centralized authority is attacked. In addition, most past solutions require the online registration center to assist mutual authentication and consume considerable amounts of resources. To address these drawbacks, a computationtransferable authenticated key agreement protocol without an online registration center for smart healthcare is designed. Specifically, the proposed protocol can realize mutual authentication and key agreement without the need for an online registration center, as well as being able to satisfy security and privacy protection requirements. By transferring partial computation tasks to the server, the proposed scheme incurs lower computation and communication overhead on the user side. Moreover, the proposed scheme adopts certificateless public key cryptography, which can solve the problems of certificate management and key escrow. Performance analysis indicates that the proposal reduces 9.9% of the computation overhead on the resource-limited terminal, which is suitable for low-power IoT applications, including smart healthcare.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] A secure and efficient certificateless authenticated key agreement protocol for smart healthcare
    Ma, Yuqian
    Ma, Yongliu
    Liu, Yidan
    Cheng, Qingfeng
    [J]. COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [2] Authenticated Key Agreement Protocol
    Dehkordi, Massoud Hadian
    Alimoradi, Reza
    [J]. CHINA COMMUNICATIONS, 2010, 7 (05) : 1 - 8
  • [3] A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare
    Ma, Yuqian
    Ma, Yongliu
    Liu, Yidan
    Cheng, Qingfeng
    [J]. CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 17 - 31
  • [4] Lightweight and dynamic authenticated key agreement and management protocol for smart grid
    Zhai, Feng
    Yang, Ting
    Sun, Wei
    Fang, Xu
    [J]. FRONTIERS IN ENERGY RESEARCH, 2023, 10
  • [5] Strongly secure authenticated key agreement protocol using smart card
    Li, Xiao-Wei
    Zhang, Yu-Qing
    Zhang, Ge-Fei
    Liu, Xue-Feng
    Fan, Dan
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2014, 42 (08): : 1587 - 1593
  • [6] A secure authenticated key agreement protocol
    Popescu, C
    [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [7] A Deniable Authenticated Key Agreement Protocol
    TIAN Haibo1
    2. Guangdong Key Laboratory of Information Security Technology
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 645 - 650
  • [8] Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment
    Khatoon, Shaheena
    Rahman, S. K. Md Mizanur
    Alrubaian, Majed
    Alamri, Atif
    [J]. IEEE ACCESS, 2019, 7 : 47962 - 47971
  • [9] Authenticated commutator key agreement protocol
    Ushakov A.
    [J]. Groups, Complexity, Cryptology, 2016, 8 (02) : 127 - 133
  • [10] A new authenticated key agreement protocol
    Abi-Char, Pierre E.
    Mhamed, Abdallah
    El-Hassan, Bachar
    [J]. NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 629 - 629