Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems

被引:79
作者
Islam, S. K. Hafizul [1 ]
Khan, Muhammad Khurram [2 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani 333031, Rajasthan, India
[2] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Anonymity; Authentication; Random oracle model; Smartcard; Cryptanalysis; Hash function; Password; REMOTE USER AUTHENTICATION; PROVABLY SECURE; SCHEME; EFFICIENT; ANONYMITY; ENVIRONMENT;
D O I
10.1007/s10916-014-0135-9
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Recently, many authentication protocols have been presented using smartcard for the telecare medicine information system (TMIS). In 2014, Xu et al. put forward a two-factor mutual authentication with key agreement protocol using elliptic curve cryptography (ECC). However, the authors have proved that the protocol is not appropriate for practical use as it has many problems (1) it fails to achieve strong authentication in login and authentication phases; (2) it fails to update the password correctly in the password change phase; (3) it fails to provide the revocation of lost/stolen smartcard; and (4) it fails to protect the strong replay attack. We then devised an anonymous and provably secure two-factor authentication protocol based on ECC. Our protocol is analyzed with the random oracle model and demonstrated to be formally secured against the hardness assumption of computational Diffie-Hellman problem. The performance evaluation demonstrated that our protocol sa outperforms from the perspective of security, functionality and computation costs over other existing designs.
引用
收藏
页数:16
相关论文
共 38 条
[1]  
Bellare M, 1993, P 1 ACM C COMP COMM, P6273
[2]   An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems [J].
Chen, Hung-Ming ;
Lo, Jung-Wen ;
Yeh, Chang-Kuo .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) :3907-3915
[3]   Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards [J].
Das, A. K. .
IET INFORMATION SECURITY, 2011, 5 (03) :145-151
[4]   An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System [J].
Das, Ashok Kumar ;
Bruhadeshwar, Bezawada .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
[5]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[6]   Robust remote authentication scheme with smart cards [J].
Fan, CI ;
Chan, YC ;
Zhang, ZK .
COMPUTERS & SECURITY, 2005, 24 (08) :619-628
[7]   An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings [J].
He, Debiao .
AD HOC NETWORKS, 2012, 10 (06) :1009-1016
[8]   A More Secure Authentication Scheme for Telecare Medicine Information Systems [J].
He Debiao ;
Chen Jianhua ;
Zhang Rui .
JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (03) :1989-1995
[9]  
Islam S. H., 2014, J SAUD U COMPUT INF
[10]   Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings [J].
Islam, S. K. Hafizul ;
Biswas, G. P. .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2013, 25 (01) :51-61