2022
DOI: 10.1007/s13369-022-07235-0
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Two-Factor-Based User Authentication Protocol for IoT-Enabled Healthcare Ecosystem in Quantum Computing

Abstract: The healthcare ecosystem is migrating from legacy systems to the Internet of Things (IoT), resulting in a digital environment. This transformation has increased importance on demanding both secure and usable user authentication methods. Recently, a post-quantum fuzzy commitment scheme (PQFC) has been constructed as a reliable and efficient method of biometric template protection. This paper presents a new two-factor-based user authentication protocol for the IoT-enabled healthcare ecosystem in post-quantum com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…The security has been validated by utilizing the random oracle model (ROM). Its performance has been found to be more efficient than other related protocols [5]. In paper [23], a novel pairing-free authentication and aggregation mechanism based on elliptic curve cryptography is proposed to protect data privacy and security in healthcare systems.…”
Section: Internet Of Medical Things (Iomt)mentioning
confidence: 99%
See 2 more Smart Citations
“…The security has been validated by utilizing the random oracle model (ROM). Its performance has been found to be more efficient than other related protocols [5]. In paper [23], a novel pairing-free authentication and aggregation mechanism based on elliptic curve cryptography is proposed to protect data privacy and security in healthcare systems.…”
Section: Internet Of Medical Things (Iomt)mentioning
confidence: 99%
“…Its public key is calculated in Eqn. (5), where G is the base point on the elliptic curve. Elliptic Curve Diffie-Hellman is a variant of the Diffie-Hellman protocol that uses ECC to generate a shared secret between two parties, as shown in Figure 6.…”
Section: ) Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%
See 1 more Smart Citation
“…Agrahari et al [37] devised an AKA protocol for healthcare monitoring systems, ensuring the security of patient data during transmission. Al-Saggaf et al [38] proposed a two-factor AKA protocol based on IoHT, utilizing quantum computing for enhanced security.…”
Section: Introductionmentioning
confidence: 99%