A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography

被引:3
作者
Chen, Yulei [1 ]
Chen, Jianhua [2 ]
机构
[1] Zhoukou Normal Univ, Sch Math & Stat, Zhoukou 466001, Peoples R China
[2] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
关键词
Authentication; Key agreement; Biometrics; TMIS; ROM; SMART CARDS; SCHEME; SECURE; EFFICIENT;
D O I
10.1007/s11042-022-14007-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical functions such as remote disease diagnosis, treatment, and health care. Because TMIS is carried out on an insecure public Internet, a large number of mutual authentication and key agreement protocols for TMIS have been proposed to protect the privacy of patients. Recently, Ostad-Sharif et al. proposed a novel anonymous authentication and key agreement scheme for TMIS. In this work, we will demonstrate that Ostad-Sharif et al.'s scheme exists the problems of strong authentication and inefficient password change, and it cannot resist the off-line password guessing attack. To overcome the weaknesses found in Ostad-Sharif et al.'s scheme, we propose a biometrics-based mutual authentication and key agreement protocol for TMIS, making full use of the advantages of one-way hash function and elliptic curve cryptosystem (ECC). The security of the proposed scheme is formally proved under the widely used random oracle model (ROM), and various known malicious attack resistances also are presented by the heuristic discussion. Compared with the existing related schemes, the computation cost and communication overhead of our scheme are reduced by 74.5% and 27.3% respectively.
引用
收藏
页码:16009 / 16032
页数:24
相关论文
共 41 条
[31]   Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multiserver Environment [J].
Shunmuganathan, Saraswathi ;
Saravanan, Renuka Devi ;
Palanichamy, Yogesh .
CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE, 2015, 38 (01) :20-30
[32]   Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards [J].
Singh, Anuj Kumar ;
Solanki, Arun ;
Nayyar, Anand ;
Qureshi, Basit .
APPLIED SCIENCES-BASEL, 2020, 10 (22) :1-27
[33]   IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network [J].
Stergiou, Christos L. ;
Psannis, Konstantinos E. ;
Gupta, Brij B. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5164-5171
[34]   An efficient remote use authentication scheme using smart cards [J].
Sun, HM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) :958-961
[35]   An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map [J].
Sureshkumar, Venkatasamy ;
Amin, Ruhul ;
Obaidat, Mohammad S. ;
Karthikeyan, Isswarya .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
[36]   Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags [J].
Tewari, Aakanksha ;
Gupta, B. B. .
JOURNAL OF SUPERCOMPUTING, 2017, 73 (03) :1085-1102
[37]   Novel Anonymous Authentication Scheme Using Smart Cards [J].
Tsai, Jia-Lun ;
Lo, Nai-Wei ;
Wu, Tzong-Chen .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (04) :2004-2013
[38]   Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound [J].
Wang, Ding ;
Wang, Ping .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :708-722
[39]   Visual saliency guided complex image retrieval [J].
Wang, Haoxiang ;
Li, Zhihui ;
Li, Yang ;
Gupta, B. B. ;
Choi, Chang .
PATTERN RECOGNITION LETTERS, 2020, 130 :64-72
[40]   Two-factor mutual authentication based on smart cards and passwords [J].
Yang, Guomin ;
Wong, Duncan S. ;
Wang, Huaxiong ;
Deng, Xiaotie .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2008, 74 (07) :1160-1172