A Secure Sketch-based Authentication Scheme for Telecare Medicine Information Systems

被引:0
|
作者
Zhang, Min [1 ,2 ]
Zhang, Jia-Shu [1 ]
Tan, Wen-Rong [3 ]
机构
[1] Southwest JiaoTong Univ, Sichuan Prov Key Lab Signal & Informat Proc, Chengdu 610031, Sichuan, Peoples R China
[2] Southwest Univ Nationalities, Sch Foreign Languages, Chengdu 610041, Sichuan, Peoples R China
[3] Southwest Univ Nationalities, Sch Comp Sci & Technol, Chengdu 610041, Sichuan, Peoples R China
关键词
authentication; secure sketch; biometrics; three-factor; telecare medicine information system (TMIS); PASSWORD AUTHENTICATION; IMPROVEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Telecare Medicine Information System (TMIS) has brought us a lot of conveniences. However, it may also reveal patients' privacies and other important information. So the security of TMIS can be paid much attention to, in which identity authentication plays a very important role in protecting TMIS from being illegally used. To improve the situation, TMIS needs a more secure and more efficient authentication scheme. Recently, Yan and Li et al. have proposed a secure authentication scheme for the TMIS based on biometrics, claiming that it can withstand various attacks. In this paper, we present several security problems in their scheme as follows: (a) it cannot really achieve three-factor authentication; (b) it has design flaws at the password change phase; (c) users' biometric may be locked out; (d) it fails to achieve users' anonymous identity. To solve these problems, a new scheme using the theory of Secure Sketch is proposed. The thorough analysis shows that our scheme can provide a stronger security than Yan-Li's protocol, despite the little higher computation cost at client. What's more, the proposed scheme not only can achieve anonymity preserving but also can achieve session key agreement.
引用
收藏
页码:389 / 402
页数:14
相关论文
共 50 条
  • [41] A Lightweight Biometric-based Authentication Scheme for Telecare Medicine Information Systems Using ECC
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    [J]. 2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [42] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Yau, Wei-Chuen
    Phan, Raphael C. -W.
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (06)
  • [43] A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems
    Wang, Zhiheng
    Huo, Zhanqiang
    Shi, Wenbo
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (01)
  • [44] A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems
    Omid Mir
    Theo van der Weide
    Cheng-Chi Lee
    [J]. Journal of Medical Systems, 2015, 39
  • [45] A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems
    Mir, Omid
    van der Weide, Theo
    Lee, Cheng-Chi
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (09)
  • [46] A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
    Chun-Ta Li
    Cheng-Chi Lee
    Chi-Yao Weng
    [J]. Journal of Medical Systems, 2014, 38
  • [47] A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (09)
  • [48] Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems
    Sutrala, Anil Kumar
    Das, Ashok Kumar
    Odelu, Vanga
    Wazid, Mohammad
    Kumari, Saru
    [J]. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2016, 135 : 167 - 185
  • [49] Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Roy, Sandip
    Chatterjee, Santanu
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 527 - 537
  • [50] A robust authentication scheme for telecare medical information systems
    R. Madhusudhan
    Chaitanya S. Nayak
    [J]. Multimedia Tools and Applications, 2019, 78 : 15255 - 15273