2016
DOI: 10.1007/s10916-015-0422-0
|View full text |Cite
|
Sign up to set email alerts
|

An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps

Abstract: Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
36
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
7
2

Relationship

4
5

Authors

Journals

citations
Cited by 54 publications
(36 citation statements)
references
References 40 publications
0
36
0
Order By: Relevance
“…After receiving the 10 , the C checks whether the total amount is correct and is true. If it holds, the C computes 11 ={ , , 4 , ℎ 4 ,continue} , and sends it to M in order to express that he/she wants to continue the payment processes, otherwise the customer aborts payment, where ℎ 4 = ( , , , 3 ).…”
Section: 23mentioning
confidence: 99%
“…After receiving the 10 , the C checks whether the total amount is correct and is true. If it holds, the C computes 11 ={ , , 4 , ℎ 4 ,continue} , and sends it to M in order to express that he/she wants to continue the payment processes, otherwise the customer aborts payment, where ℎ 4 = ( , , , 3 ).…”
Section: 23mentioning
confidence: 99%
“…The biohashing technique is also applied in our scheme, illustrated in Section 5. We use an input value Bio as a combination of the user’s biometric information and a random key for convenience, like other authentication schemes [24,25,26,27] using the biohashing technique.…”
Section: Introductionmentioning
confidence: 99%
“…That is to say, the identical biometric information creates the identical value of Hfalse(Biofalse), and it is impossible to calculate an input value Bio from the result value of Hfalse(Biofalse). Until now, many authentication studies have been conducted [24,25,26,27] based on the biohashing technique. Our proposed scheme also adopts the user’s biometric information applying a biohashing, and the details are given below in Section 5.…”
Section: Introductionmentioning
confidence: 99%
“…To design a secure authentication scheme, some cryptographic algorithms are also used, such as an RSA cryptosystem [14,15], elliptic curve cryptography [16,17], hash function [18,19], and chaos-based cryptography [20][21][22].…”
Section: Introductionmentioning
confidence: 99%