An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems

被引:0
|
作者
Preecha Yupapin
Chandrashekhar Meshram
Sharad Kumar Barve
Rabha W. Ibrahim
Muhammad Azeem Akbar
机构
[1] Institute of Vocational Education Northeastern 2,Department of Electrical Technology, School of Industrial Technology
[2] Jaywanti Haksar Government Post-Graduate College,Department of Post Graduate Studies and Research in Mathematics
[3] College of Chhindwara University,Department of Mathematics
[4] Pandit S. N. Shukla University Shahdol,Department of Computer Science and Mathematics
[5] Lebanese American University,The Software Engineering Department
[6] LUT University,undefined
来源
Soft Computing | 2023年 / 27卷
关键词
TMIS; Fractional chaotic maps; Provable security; Authentication; Data exchange and hash function;
D O I
暂无
中图分类号
学科分类号
摘要
The telecare medicine information systems (TMIS) offer a networking channel across public networks to access remote medical services and enable health care professionals and medical staff to make the best clinical decisions and treatments quickly. The verified-based three-party authentication protocol in TMIS for data exchange, authorizations only two patients/users to accumulation their verifiers in the record of authentication server calculated exhausting own password. The authentication scheme will then verify the verifiers of the patients/users and allow them to exchange electronic medical records securely and easily. In this paper, we provide an effective, provably secure, verified-based three-party authentication protocol for data exchange in TMIS utilising fractional chaotic maps. The authentication protocol provided does not use any public server keys and does not require the number of additional messages and rounds for key validation. The projected protocol is appropriate for TMIS because it has stronger security and cheaper communication costs than the corresponding verified-based approach. The development of smart cities can be accelerated with the proposed protocol.
引用
收藏
页码:6033 / 6047
页数:14
相关论文
共 50 条
  • [41] Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems
    Xuelei Li
    Qiaoyan Wen
    Wenmin Li
    Hua Zhang
    Zhengping Jin
    Journal of Medical Systems, 2014, 38
  • [42] An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems
    Chengqi Wang
    Xiao Zhang
    Zhiming Zheng
    Multimedia Tools and Applications, 2017, 76 : 24315 - 24341
  • [43] Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems
    Li, Xuelei
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (11)
  • [44] An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems
    Wang, Chengqi
    Zhang, Xiao
    Zheng, Zhiming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (22) : 24315 - 24341
  • [45] A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier
    Patel, Khushboo A.
    Shukla, Shivangi
    Patel, Sankita J.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (02)
  • [46] A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems
    Lee, Tian-Fu
    Diao, Yin-Yu
    Hsieh, Yi-Pei
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) : 31649 - 31672
  • [47] A ticket-based multi-server biometric authentication scheme using extended chaotic maps for telecare medical information systems
    Tian-Fu Lee
    Yin-Yu Diao
    Yi-Pei Hsieh
    Multimedia Tools and Applications, 2019, 78 : 31649 - 31672
  • [48] CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique Based on Fractional Chaotic Maps
    Meshram, Chandrashekhar
    Imoize, Agbotiname Lucky
    Jamal, Sajjad Shaukat
    Alharbi, Adel R.
    Meshram, Sarita Gajbhiye
    Hussain, Iqtadar
    IEEE ACCESS, 2022, 10 : 39853 - 39863
  • [49] A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain
    Yadav, Awaneesh Kumar
    Braeken, An
    Misra, Manoj
    Liyange, Madhusanka
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [50] A Lightweight Biometric-based Authentication Scheme for Telecare Medicine Information Systems Using ECC
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,