Cargando…
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical functions such as remote disease diagnosis, treatment, and health care. Because TMIS is carried out on an insecure public Internet, a large number of m...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9553637/ https://www.ncbi.nlm.nih.gov/pubmed/36250183 http://dx.doi.org/10.1007/s11042-022-14007-3 |
_version_ | 1784806520393826304 |
---|---|
author | Chen, Yulei Chen, Jianhua |
author_facet | Chen, Yulei Chen, Jianhua |
author_sort | Chen, Yulei |
collection | PubMed |
description | Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical functions such as remote disease diagnosis, treatment, and health care. Because TMIS is carried out on an insecure public Internet, a large number of mutual authentication and key agreement protocols for TMIS have been proposed to protect the privacy of patients. Recently, Ostad-Sharif et al. proposed a novel anonymous authentication and key agreement scheme for TMIS. In this work, we will demonstrate that Ostad-Sharif et al.’s scheme exists the problems of strong authentication and inefficient password change, and it cannot resist the off-line password guessing attack. To overcome the weaknesses found in Ostad-Sharif et al.’s scheme, we propose a biometrics-based mutual authentication and key agreement protocol for TMIS, making full use of the advantages of one-way hash function and elliptic curve cryptosystem (ECC). The security of the proposed scheme is formally proved under the widely used random oracle model (ROM), and various known malicious attack resistances also are presented by the heuristic discussion. Compared with the existing related schemes, the computation cost and communication overhead of our scheme are reduced by 74.5% and 27.3% respectively. |
format | Online Article Text |
id | pubmed-9553637 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-95536372022-10-12 A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography Chen, Yulei Chen, Jianhua Multimed Tools Appl Article Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical functions such as remote disease diagnosis, treatment, and health care. Because TMIS is carried out on an insecure public Internet, a large number of mutual authentication and key agreement protocols for TMIS have been proposed to protect the privacy of patients. Recently, Ostad-Sharif et al. proposed a novel anonymous authentication and key agreement scheme for TMIS. In this work, we will demonstrate that Ostad-Sharif et al.’s scheme exists the problems of strong authentication and inefficient password change, and it cannot resist the off-line password guessing attack. To overcome the weaknesses found in Ostad-Sharif et al.’s scheme, we propose a biometrics-based mutual authentication and key agreement protocol for TMIS, making full use of the advantages of one-way hash function and elliptic curve cryptosystem (ECC). The security of the proposed scheme is formally proved under the widely used random oracle model (ROM), and various known malicious attack resistances also are presented by the heuristic discussion. Compared with the existing related schemes, the computation cost and communication overhead of our scheme are reduced by 74.5% and 27.3% respectively. Springer US 2022-10-12 2023 /pmc/articles/PMC9553637/ /pubmed/36250183 http://dx.doi.org/10.1007/s11042-022-14007-3 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022, Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Chen, Yulei Chen, Jianhua A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography |
title | A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography |
title_full | A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography |
title_fullStr | A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography |
title_full_unstemmed | A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography |
title_short | A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography |
title_sort | biometrics-based mutual authentication and key agreement protocol for tmis using elliptic curve cryptography |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9553637/ https://www.ncbi.nlm.nih.gov/pubmed/36250183 http://dx.doi.org/10.1007/s11042-022-14007-3 |
work_keys_str_mv | AT chenyulei abiometricsbasedmutualauthenticationandkeyagreementprotocolfortmisusingellipticcurvecryptography AT chenjianhua abiometricsbasedmutualauthenticationandkeyagreementprotocolfortmisusingellipticcurvecryptography AT chenyulei biometricsbasedmutualauthenticationandkeyagreementprotocolfortmisusingellipticcurvecryptography AT chenjianhua biometricsbasedmutualauthenticationandkeyagreementprotocolfortmisusingellipticcurvecryptography |