| Literature DB >> 26263401 |
S K Hafizul Islam1, Muhammad Khurram Khan2, Xiong Li3.
Abstract
Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.Entities:
Mesh:
Year: 2015 PMID: 26263401 PMCID: PMC4532429 DOI: 10.1371/journal.pone.0131368
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Descriptions of various notations.
| Notations | Description |
|---|---|
|
| The patient (User) |
|
| The identity of |
|
| The password of |
|
| The medical server of integrated EPR information system |
|
| The secret key of |
|
| The counter maintained in |
|
| The secure and collision-resistance one-way hash function |
|
| Two large prime numbers |
|
| The publicly known modulus such that |
|
| The number |
| ⊕ | The bitwise XOR operator |
| ∥ | The concatenation operator |
|
| The session key agreed between |
| 𝓐 | The active/passive adversary |
Login and Authentication phases of Wen’s scheme [3].
|
|
| |
|---|---|---|
|
| ||
| Insert ⟨ | ||
|
| ||
| Select a random number | ||
| Compute | ||
| Compute | ||
|
| ||
| Extract ⟨ | ||
| Obtain ⟨ | ||
| If ( | ||
| abort the session | ||
| Else | ||
| update ⟨ | ||
| Compute | ||
| If ( | ||
| abort the session | ||
| Else | ||
| authenticate | ||
| Compute the session key | ||
| Compute | ||
|
| ||
|
| ||
| Compute | ||
| If ( | ||
| abort the session | ||
| Else | ||
| authenticate | ||
| Compute the session key |
Login and authentication phases of the proposed user authentication scheme.
|
|
| |
|---|---|---|
|
| ||
| Insert ⟨ | ||
|
| ||
| Compute | ||
| Compute | ||
| If ( | ||
| terminate the session | ||
| Else | ||
| compute | ||
| Choose | ||
| Compute | ||
|
| ||
| Obtain | ||
| Retrieve ⟨ | ||
| If ( | ||
| terminate the session | ||
| Else | ||
| update ⟨ | ||
| Compute | ||
| If ( | ||
| terminate the session | ||
| Else | ||
| select | ||
| Compute | ||
| Session key | ||
| Compute | ||
|
| ||
|
| ||
| Compute | ||
| Session key | ||
| Compute | ||
| If ( | ||
| terminate the session | ||
| Else | ||
| authenticate | ||
| Accept |
Computation cost comparison of the proposed user authentication scheme with others.
| Attributes | Wen [ | Zhu [ | Wu et al. [ | Cheng et al. [ | Lee [ | Proposed |
|---|---|---|---|---|---|---|
|
| 2 | 2 | 2 |
| 2 | 2 |
|
| 9 | 5 | 6 | 12 | 8 | 5 |
|
| 4 | 4 | NA | NA | NA | 4 |
|
| NA | NA | NA | NA | NA | 3 |
|
| 2 | 3 | 2 | 2 | 2 | 2 |
A 1: Computation cost in registration phase, A 2: Computation cost in login phase and authentication phase, A 3: Computation cost in password change phase, A 4: Computation cost in smartcard revocation phase, A 5: Number of message communications, NA: Not applicable (this pase is not proposed by the author (s)).
Fig 1Number of hash, modular squaring and square root operations for registration and login phases.
Security and functionality comparison of the proposed scheme with other existing schemes.
| Attributes | Wen [ | Zhu [ | Wu et al. [ | Cheng et al. [ | Lee [ | Proposed |
|---|---|---|---|---|---|---|
|
| No | No | No | No | No | Yes |
|
| No | No | NA | NA | NA | Yes |
|
| No | Yes | Yes | No | Yes | Yes |
|
| No | Yes | No | Yes | No | Yes |
|
| No | No | No | No | No | Yes |
|
| No | NA | NA | No | NA | Yes |
|
| No | NA | NA | Yes | NA | Yes |
|
| No | Yes | NA | No | No | Yes |
|
| Yes | NA | NA | No | No | Yes |
|
| Yes | No | No | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | NA | No | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes | Yes |
F 1: Login identity and password detection in the login phase; F 2: Login identity and password detection in the password change phase; F 3: Impersonation attack is avoided; F 4: Privileged-insider attack is avoided; F 5: Lost/stolen smart card revocation phase is present; F 6: Explicit session key confirmation property is present; F 7: No key control property is present; F 8: Password is changed without any help from the server; F 9: Ephemeral secrets leakage attack is avoided; F 10: User anonymity and unlinkability are present; F 11: Password guessing attack from lost smart card is avoided; F 12: Replay attack is avoided; F 13: Forward secrecy of the session key is present; F 14: modification/forgery attack is avoided.