Skip to main content
Top
Published in: Journal of Medical Systems 2/2013

01-04-2013 | Original Paper

Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems

Authors: Tianjie Cao, Jingxuan Zhai

Published in: Journal of Medical Systems | Issue 2/2013

Login to get access

Abstract

In order to protect users’ identity privacy, Chen et al. proposed an efficient dynamic ID-based authentication scheme for telecare medical information systems. However, Chen et al.’s scheme has some weaknesses. In Chen et al.’s scheme, an attacker can track a user by a linkability attack or an off-line identity guessing attack. Chen et al.’s scheme is also vulnerable to an off-line password guessing attack and an undetectable on-line password guessing attack when user’s smart card is stolen. In server side, Chen et al.’s scheme needs large computational load to authentication a legal user or reject an illegal user. To remedy the weaknesses in Chen et al.’s scheme, we propose an improved smart card based password authentication scheme. Our analysis shows that the improved scheme can overcome the weaknesses in Chen et al.’s scheme.
Literature
1.
go back to reference Lamport, L., Password authentication with insecure communication. comm. ACM 24(11):770–772, 1981.CrossRef Lamport, L., Password authentication with insecure communication. comm. ACM 24(11):770–772, 1981.CrossRef
2.
go back to reference Hwang, M.S., and Li, L.H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 488 46(1):28–30, 2000.CrossRef Hwang, M.S., and Li, L.H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 488 46(1):28–30, 2000.CrossRef
3.
7.
go back to reference Das, M.L., Saxena, A., Gulati, V.P., A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron 50(2):629–631, 2004.CrossRef Das, M.L., Saxena, A., Gulati, V.P., A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron 50(2):629–631, 2004.CrossRef
8.
go back to reference Li, C.-T., Secure smart card based password authentication scheme with user anonymity. Information Technology and Control 40(2):157–162, 2011.CrossRef Li, C.-T., Secure smart card based password authentication scheme with user anonymity. Information Technology and Control 40(2):157–162, 2011.CrossRef
9.
go back to reference Wang, R.C., Juang,W.S., Lei, C.L., Robust authentication and key agreement scheme preserving the privacy of secret key. Comput. Commun 34(3):274–280, 2011.CrossRef Wang, R.C., Juang,W.S., Lei, C.L., Robust authentication and key agreement scheme preserving the privacy of secret key. Comput. Commun 34(3):274–280, 2011.CrossRef
10.
go back to reference Chen, H.-M., Lo, J.-W., Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst., 2012. doi:10.1007/s10916-012-9862-y. Chen, H.-M., Lo, J.-W., Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst., 2012. doi:10.​1007/​s10916-012-9862-y.
11.
go back to reference Khan, M.K., et al., Cryptanalysis and security enhancement of a more efficient and secure dynamic id-based remote user authentication scheme. Comput. Commun 34(3):305–309, 2010.CrossRef Khan, M.K., et al., Cryptanalysis and security enhancement of a more efficient and secure dynamic id-based remote user authentication scheme. Comput. Commun 34(3):305–309, 2010.CrossRef
12.
go back to reference Kocher, P., Jaffe, J., Jun, B., Differential power analysis. In: Proceedings of Advances in Cryptology 1999, pp. 388–397, 1999. Kocher, P., Jaffe, J., Jun, B., Differential power analysis. In: Proceedings of Advances in Cryptology 1999, pp. 388–397, 1999.
13.
go back to reference Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef
Metadata
Title
Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
Authors
Tianjie Cao
Jingxuan Zhai
Publication date
01-04-2013
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 2/2013
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-012-9912-5

Other articles of this Issue 2/2013

Journal of Medical Systems 2/2013 Go to the issue