2015
DOI: 10.1007/s10916-015-0351-y
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography

Abstract: In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance ov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
59
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 93 publications
(59 citation statements)
references
References 52 publications
0
59
0
Order By: Relevance
“…Let ⟨ ⟩ ← Reveal( 2 = ℎ( ‖ )) (12) if ( == ) then (13) Accept ID , ( ) , , as the correct ID , ( ), , , respectively. (14) return 0 (Success) (15) else (16) return 0 (Failure) (17) else (18) return 0 (Failure) (19) else (20) return 0 (Failure) (21) end if roles. The fundamental types available in the HLPSL are [46] as follows:…”
Section: Simulation Results Using Avispamentioning
confidence: 99%
See 1 more Smart Citation
“…Let ⟨ ⟩ ← Reveal( 2 = ℎ( ‖ )) (12) if ( == ) then (13) Accept ID , ( ) , , as the correct ID , ( ), , , respectively. (14) return 0 (Success) (15) else (16) return 0 (Failure) (17) else (18) return 0 (Failure) (19) else (20) return 0 (Failure) (21) end if roles. The fundamental types available in the HLPSL are [46] as follows:…”
Section: Simulation Results Using Avispamentioning
confidence: 99%
“…To design a secure authentication scheme, some cryptographic algorithms are also used, such as an RSA cryptosystem [14,15], elliptic curve cryptography [16,17], hash function [18,19], and chaos-based cryptography [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…In this section, the proposed scheme is compared with the recently proposed schemes of Xu et al , , Amin‐Biswas , Amin et al , , Lu et al , , and Amin et al , with respect to computational cost, communication cost during login, and authentication and key agreement phases, and also functionality features. The registration is a one‐time process; identity change and password change are not frequently performed operations of the protocol.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…Amin et al , also presented an efficient authentication scheme for TMIS using the elliptic curve cryptographic technique. As in , their scheme is also vulnerable to privileged‐insider attack through the smart card stolen attack because of the following reason.…”
Section: Introductionmentioning
confidence: 99%
“…A host of authentication schemes for all kinds of communications has been proposed, such as signatures and key agreement schemes . Two‐factor mechanism attracts the researchers, such as . In the earlier schemes, besides the password chosen by the user, the mobile device was equipped with a smart card, which was assigned by a server.…”
Section: Introductionmentioning
confidence: 99%