Skip to main content
Top
Published in: Journal of Medical Systems 5/2013

01-10-2013 | Original Paper

A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce

Authors: Amit K. Awasthi, Keerti Srivastava

Published in: Journal of Medical Systems | Issue 5/2013

Login to get access

Abstract

In recent years, the increased availability of lower-cost telecommunications systems and customized patients monitoring devices made it possible to bring the advantages of telemedicine directly into the patient’s home. These telecare medicine information systems enable health-care delivery services. These systems are moving towards an environment where automated patient medical records and electronically interconnected telecare facilities are prevalent. Authentication, security, patient’s privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). A secure authentication scheme will be required to achieve these goals. Many schemes based on cryptography have been proposed to achieve the goals. However, many schemes are vulnerable to various attacks, and are neither efficient, nor user friendly. Specially, in terms of efficiency, some schemes are resulting in high time cost. In this paper we propose a new authentication scheme that is using the precomputing to avoid the time-consuming exponential computations. Finally, it is shown to be more secure and practical for telecare medicine environments.
Literature
1.
go back to reference Menezes, A. J., Oorschot, P. C., and Vanstone, S. A., Handbook of applied cryptography. CRC Press, 1997. Menezes, A. J., Oorschot, P. C., and Vanstone, S. A., Handbook of applied cryptography. CRC Press, 1997.
2.
go back to reference Chang, C. C., and Hwang, K. F., Some forgery attack on a remote user authentication scheme using smart card. Informatica 14(3):289–294, 2003.MathSciNetMATH Chang, C. C., and Hwang, K. F., Some forgery attack on a remote user authentication scheme using smart card. Informatica 14(3):289–294, 2003.MathSciNetMATH
3.
go back to reference Chan C. K., and Cheng, L. M., Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):992–993, 2000.CrossRef Chan C. K., and Cheng, L. M., Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):992–993, 2000.CrossRef
4.
go back to reference Deng, S., Xiao, D., Liao, X., One-way hash function construction based on chaotic map with changeable parameter. Chaos, Solitons Fractals 24:65–71, 2005.MathSciNetMATH Deng, S., Xiao, D., Liao, X., One-way hash function construction based on chaotic map with changeable parameter. Chaos, Solitons Fractals 24:65–71, 2005.MathSciNetMATH
5.
go back to reference Sun, H. M., An efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):958–961, 2000.CrossRef Sun, H. M., An efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):958–961, 2000.CrossRef
6.
go back to reference Yeh, H. T., Sun, H. M., and Hsieh, B. T., Security of a remote user authentication scheme using smart cards. IEICE Trans. Commun. B(1)(E87):192–194, 2004. Yeh, H. T., Sun, H. M., and Hsieh, B. T., Security of a remote user authentication scheme using smart cards. IEICE Trans. Commun. B(1)(E87):192–194, 2004.
7.
go back to reference Hwang, T., Chen, Y., and Laih, C.-S., Non-interactive password authentications without password tables. In: Computer and Communication Systems, 1990. IEEE TENCON’90., 1990 IEEE Region 10 Conference on, Vol. 1, pages 429–431, 1990. Hwang, T., Chen, Y., and Laih, C.-S., Non-interactive password authentications without password tables. In: Computer and Communication Systems, 1990. IEEE TENCON’90., 1990 IEEE Region 10 Conference on, Vol. 1, pages 429–431, 1990.
8.
go back to reference Liu S., and Sun, L., Cryptographic pseudo random sequence from spatial chaotic map. Chaos, Solitions Fractals 41:2216–2229, 2009.CrossRef Liu S., and Sun, L., Cryptographic pseudo random sequence from spatial chaotic map. Chaos, Solitions Fractals 41:2216–2229, 2009.CrossRef
9.
go back to reference Lamport, L., Password authentication with insecure communication. Commun. ACM 24:770–772, 1981.CrossRef Lamport, L., Password authentication with insecure communication. Commun. ACM 24:770–772, 1981.CrossRef
10.
go back to reference Sandirigama, M., Shimizu, A., and Noda, M. T., Simple and secure password authentication protocol(sas). IEICE Trans. Commun. B(6)(E83):1363–1365, 2000. Sandirigama, M., Shimizu, A., and Noda, M. T., Simple and secure password authentication protocol(sas). IEICE Trans. Commun. B(6)(E83):1363–1365, 2000.
11.
go back to reference Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart card. IEEE Trans. Consum. Electron. 46(1):28–30, 2000.CrossRef Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart card. IEEE Trans. Consum. Electron. 46(1):28–30, 2000.CrossRef
12.
go back to reference Haller, N. H., The s/key(tm) one time password system. In: Proceedings Internet Society Symposium on Network and Distributed System Seurity, pages 151-158, 1994. Haller, N. H., The s/key(tm) one time password system. In: Proceedings Internet Society Symposium on Network and Distributed System Seurity, pages 151-158, 1994.
13.
go back to reference Elgamal, T., A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Inf. Theory 31(4):469–472, 1985.CrossRef Elgamal, T., A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Inf. Theory 31(4):469–472, 1985.CrossRef
14.
go back to reference Chen T. H., and Lee, W. B., A new method for using hash function to solve remote user authentication. Comput. Electr. Eng. 34(1):53–62, 2008.MathSciNetCrossRefMATH Chen T. H., and Lee, W. B., A new method for using hash function to solve remote user authentication. Comput. Electr. Eng. 34(1):53–62, 2008.MathSciNetCrossRefMATH
15.
go back to reference Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef
Metadata
Title
A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
Authors
Amit K. Awasthi
Keerti Srivastava
Publication date
01-10-2013
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 5/2013
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-013-9964-1

Other articles of this Issue 5/2013

Journal of Medical Systems 5/2013 Go to the issue