2018
DOI: 10.1155/2018/9146297
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment

Abstract: Compared with traditional paper medical records, electronic medical records have many advantages such as easy transmission, high efficiency, better accuracy, and easier storage. The further development and penetration of electronic medical records will raise increasingly critical transmitted-data accuracy and security issues. Previous studies have proposed a verifier-based three-party authentication scheme and to provide high efficiency and security, with low computation and transmission costs. However, this p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Haseeb et al introduce an LSDAR scheme that provides secure and energy-efficient data forwarding [ 17 ]. The authentication method is presented for medical systems to protect the data from different security threats [ 18 ]. Fatemeh et al introduce a cryptographic accumulator method that provides secure data collection and also provides data analysis in the encrypted state to preserve the data integrity of critical patient medical data [ 19 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Haseeb et al introduce an LSDAR scheme that provides secure and energy-efficient data forwarding [ 17 ]. The authentication method is presented for medical systems to protect the data from different security threats [ 18 ]. Fatemeh et al introduce a cryptographic accumulator method that provides secure data collection and also provides data analysis in the encrypted state to preserve the data integrity of critical patient medical data [ 19 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The three-party mutual authentication protocol can be applied to a variety of different scenarios. Chiou et al [18] applied the three-party mutual authentication protocol into the medical environment and it satisfied more security requirements than above two. Jia et al [19] applied the threeparty mutual authentication protocol to the IoT healthcare system.…”
Section: Related Workmentioning
confidence: 99%
“…Lin et al [12] proposed verifier-based 3PAKE with low computational cost and transfer cost based on password and modulator exponential operation. However, Chiou [13] pointed out that Lin's scheme does not provide anonymity and untraceability and is not computationally efficient, and proposed 3PAKE that provides anonymity and untraceability by implementing message encryption with long term key. However, since his scheme also performs key exchange [45] based on modular exponential operation, the computation is still not efficient.…”
Section: Related Workmentioning
confidence: 99%
“…Typical encryption methods used for key exchange include secret-key encryption [26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42][43] and public-key encryption. Public-key encryption methods include in detail modular exponential operation -based schemes [6][7][8][9][10][11][12][13], elliptic curve encryption-based schemes [14,15,[30][31][32][33]34], chaotic maps-based schemes [16][17][18][19][20][21][22][23][24][25] and bilinear pairing-based schemes [34,36]. User authentication is a key issue in authentication key exchange as a process of verifying whether a user is legal or not, where it is important to use authentication factor.…”
Section: Introductionmentioning
confidence: 99%