A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems

被引:0
|
作者
Chun-Ta Li
Cheng-Chi Lee
Chi-Yao Weng
机构
[1] Tainan University of Technology,Department of Information Management
[2] Fu Jen Catholic University,Department of Library and Information Science
[3] Asia University,Department of Photonics and Communication Engineering
[4] National Tsing Hua University,Department of Computer Science
来源
关键词
Chebyshev chaotic maps; Remote user authentication; Service misuse attack; Smart card; Telecare Medicine information system (TMIS); User anonymity;
D O I
暂无
中图分类号
学科分类号
摘要
Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.’s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.’s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.’s scheme. In this paper, we found that both Lee’s and Jiang et al.’s authentication schemes have a serious security problem in that a registered user’s secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee’s scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee’s and Jiang et al.’s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.
引用
收藏
相关论文
共 50 条