A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce

被引:31
作者
Awasthi, Amit K. [1 ]
Srivastava, Keerti [2 ]
机构
[1] Gautam Buddha Univ, Sch Vocat Studies & Appl Sci, Greater Noida 201312, India
[2] Cent Inst Plast Engn & Technol, Lucknow, Uttar Pradesh, India
关键词
Telecare medicine information system; Authentication; Biometric; Nonce; PASSWORD AUTHENTICATION; SECURITY;
D O I
10.1007/s10916-013-9964-1
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
In recent years, the increased availability of lower-cost telecommunications systems and customized patients monitoring devices made it possible to bring the advantages of telemedicine directly into the patient's home. These telecare medicine information systems enable healthcare delivery services. These systems are moving towards an environment where automated patient medical records and electronically interconnected telecare facilities are prevalent. Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). A secure authentication scheme will be required to achieve these goals. Many schemes based on cryptography have been proposed to achieve the goals. However, many schemes are vulnerable to various attacks, and are neither efficient, nor user friendly. Specially, in terms of efficiency, some schemes are resulting in high time cost. In this paper we propose a new authentication scheme that is using the precomputing to avoid the time-consuming exponential computations. Finally, it is shown to be more secure and practical for telecare medicine environments.
引用
收藏
页数:4
相关论文
共 15 条
[1]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[2]  
[Anonymous], 1994, S NETW DISTR SYST SE
[3]   Cryptanalysis of a remote user authentication scheme using smart cards [J].
Chan, CK ;
Cheng, LM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) :992-993
[4]  
Chang CC, 2003, INFORMATICA-LITHUAN, V14, P289
[5]   A new method for using hash functions to solve remote user authentication [J].
Chen, Tzung-Her ;
Lee, Wei-Bin .
COMPUTERS & ELECTRICAL ENGINEERING, 2008, 34 (01) :53-62
[6]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[7]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[8]  
Hwang Tzonelih, 1990, IEEE TENCON'90: 1990 IEEE Region 10 Conference on Computer and Communication Systems (Cat. No.90CH2866-2), P429, DOI 10.1109/TENCON.1990.152647
[9]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[10]   Examining smart-card security under the threat of power analysis attacks [J].
Messerges, TS ;
Dabbish, EA ;
Sloan, RH .
IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) :541-552