Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems

被引:78
|
作者
Jiang, Qi [1 ]
Ma, Jianfeng [1 ]
Lu, Xiang [2 ]
Tian, Youliang [2 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Telecare medicine information system; Authentication and key agreement; Chaotic map; Smart card; Anonymity; CRYPTANALYSIS; EFFICIENT; PRIVACY;
D O I
10.1007/s10916-014-0012-6
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
To ensure only authorized access to medical services, several authentication schemes for telecare medicine information systems (TMIS) have been proposed in the literature. Due to its better performance than traditional cryptography, Hao et al. proposed an authentication scheme for TMIS using chaotic map based cryptography. They claimed that their scheme could resist various attacks, including the smart card stolen attack. However, we identify that their scheme is vulnerable to the stolen smart card attack. The reason causing the stolen smart card attack is that the scheme is designed based on the assumption that the scheme itself achieves user untraceability. Then, we propose a robust authentication and key agreement scheme. Compared with the previous schemes, our scheme not only enjoys more security features, but also has better efficiency. Our analysis indicates that designing a two-factor authentication scheme based on the assumption that privacy protection is achieved in the scheme itself may pose potential security risks. The lesson learned is that, we should avoid this situation in the future design of two-factor authentication schemes.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
    Qi Jiang
    Jianfeng Ma
    Xiang Lu
    Youliang Tian
    [J]. Journal of Medical Systems, 2014, 38
  • [2] Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Roy, Sandip
    Chatterjee, Santanu
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 527 - 537
  • [3] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Xinhong Hao
    Jiantao Wang
    Qinghai Yang
    Xiaopeng Yan
    Ping Li
    [J]. Journal of Medical Systems, 2013, 37
  • [4] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Hao, Xinhong
    Wang, Jiantao
    Yang, Qinghai
    Yan, Xiaopeng
    Li, Ping
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [5] A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems
    Mishra, Dheerendra
    Srinivas, Jangirala
    Mukhopadhyay, Sourav
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
  • [6] A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems
    Dheerendra Mishra
    Jangirala Srinivas
    Sourav Mukhopadhyay
    [J]. Journal of Medical Systems, 2014, 38
  • [7] A secure chaotic map-based remote authentication scheme for telecare medicine information systems
    Li, Xiong
    Wu, Fan
    Khan, Muhammad Khurram
    Xu, Lili
    Shen, Jian
    Jo, Minho
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 149 - 159
  • [8] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Wei-Chuen Yau
    Raphael C.-W. Phan
    [J]. Journal of Medical Systems, 2013, 37
  • [9] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Yau, Wei-Chuen
    Phan, Raphael C. -W.
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (06)
  • [10] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
    Wu, Fan
    Xu, Lili
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200