2015
DOI: 10.1007/s10916-015-0259-6
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems

Abstract: Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
38
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 35 publications
(38 citation statements)
references
References 31 publications
0
38
0
Order By: Relevance
“…The total communication cost of our proposed scheme and other relevant scheme [11,12,13,14] are 160*4+512*2=1664, 160*7=1120, 160*5+512=1312, 4*160+1024=1664 and 4*160+1024*2=2688 bits respectively. Next, we will compare the memory requirements to store security parameters in the smartcard of the proposed scheme with some other relevant schemes [11,12,13,14]. In our proposed scheme, the smart card incorporates the information {U S , G, r A } thus, the storage cost is 160*3=480 bits.…”
Section: Performance Comparisonmentioning
confidence: 99%
See 4 more Smart Citations
“…The total communication cost of our proposed scheme and other relevant scheme [11,12,13,14] are 160*4+512*2=1664, 160*7=1120, 160*5+512=1312, 4*160+1024=1664 and 4*160+1024*2=2688 bits respectively. Next, we will compare the memory requirements to store security parameters in the smartcard of the proposed scheme with some other relevant schemes [11,12,13,14]. In our proposed scheme, the smart card incorporates the information {U S , G, r A } thus, the storage cost is 160*3=480 bits.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…In this section, we compare the performance of the proposed protocol with some other existing relevant schemes [11,12,13,14] in terms of several security functionalities, computation and communication cost. In Table 2, we have compared the functionality features of our protocol with other relevant protocols [11,12,13,14]. It may be noted that the proposed protocol is secure against various relevant security attacks and achieves several security attributes than other protocols.…”
Section: Performance Comparisonmentioning
confidence: 99%
See 3 more Smart Citations