Extended Chaotic-Map-Based User Authentication and Key Agreement for HIPAA Privacy/Security Regulations

被引:3
作者
Hsieh, Yi-Pei [1 ]
Lee, Kuo-Chang [1 ]
Lee, Tian-Fu [2 ]
Su, Guo-Jun [2 ]
机构
[1] Tzu Chi Univ Sci & Technol, Dept Informat Technol & Management, Hualien 97005, Taiwan
[2] Tzu Chi Univ, Dept Med Informat, Hualien 97004, Taiwan
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 11期
关键词
chaotic maps; HIPAA; authentication; key agreement; PHI security; INFORMATION; MANAGEMENT; PROTOCOL; SCHEME; SECURITY;
D O I
10.3390/app12115701
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Background: The US government has enacted the Health Insurance Portability and Accountability Act (HIPAA), in which patient control over electronic protected health information is a major issue of concern. The two main goals of the Act are the privacy and security regulations in the HIPAA and the availability and confidentiality of electronic protected health information. The most recent authenticated key-agreement schemes for HIPAA privacy/security have been developed using time-consuming modular exponential computations or scalar multiplications on elliptic curves to provide higher security. However, these authenticated key-agreement schemes either have a heavy computational cost or suffer from authorization problems. Methods: Recent studies have demonstrated that cryptosystems using chaotic-map operations are more efficient than those that use modular exponential computations and scalar multiplications on elliptic curves. Additionally, enhanced Chebyshev polynomials exhibit the semigroup property and the commutative property. Hence, this paper develops a secure and efficient certificate-based authenticated key-agreement scheme for HIPAA privacy/security regulations by using extended chaotic maps. Results and Conclusions: This work develops a user-authentication and key-agreement scheme that solves security problems that afflict related schemes. This proposed key-agreement scheme depends on a certificate-management center to enable doctors, patients and authentication servers to realize mutual authentication through certificates and thereby reduce the number of rounds of communications that are required. The proposed scheme not only provides more security functions, but also has a lower computational cost than related schemes.
引用
收藏
页数:21
相关论文
共 35 条
  • [1] LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT
    Aghili, Seyed Farhad
    Mala, Hamid
    Shojafar, Mohammad
    Peris-Lopez, Pedro
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 410 - 424
  • [2] A robust authentication and access control protocol for securing wireless healthcare sensor networks
    Ali, Zeeshan
    Ghani, Anwar
    Khan, Imran
    Chaudhry, Shehzad Ashraf
    Islam, S. K. Hafizul
    Giri, Debasis
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [3] Slight: A lightweight authentication scheme for smart healthcare services
    Amintoosi, Haleh
    Nikooghadam, Mahdi
    Shojafar, Mohammad
    Kumari, Saru
    Alazab, Mamoun
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [4] [Anonymous], 1996, US GOVT HIPAA
  • [5] Security of public-key cryptosystems based on Chebyshev polynomials
    Bergamo, P
    D'Arco, P
    De Santis, A
    Kocarev, L
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) : 1382 - 1393
  • [6] Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations
    Bui, Quy-Anh
    Lee, Wei-Bin
    Lee, Jung-San
    Wu, Hsiao-Ling
    Liu, Jo-Yun
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 437 - 454
  • [7] BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
  • [8] An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
    Challa, Sravani
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Kumari, Saru
    Khan, Muhammad Khurram
    Vasilakos, Athanasios V.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 534 - 554
  • [9] Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
    Chatterjee, Santanu
    Roy, Sandip
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 824 - 839
  • [10] Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Derhab, Abdelouahid
    Janicke, Helge
    [J]. TELECOMMUNICATION SYSTEMS, 2020, 73 (02) : 317 - 348