| Literature DB >> 36250183 |
Abstract
Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical functions such as remote disease diagnosis, treatment, and health care. Because TMIS is carried out on an insecure public Internet, a large number of mutual authentication and key agreement protocols for TMIS have been proposed to protect the privacy of patients. Recently, Ostad-Sharif et al. proposed a novel anonymous authentication and key agreement scheme for TMIS. In this work, we will demonstrate that Ostad-Sharif et al.'s scheme exists the problems of strong authentication and inefficient password change, and it cannot resist the off-line password guessing attack. To overcome the weaknesses found in Ostad-Sharif et al.'s scheme, we propose a biometrics-based mutual authentication and key agreement protocol for TMIS, making full use of the advantages of one-way hash function and elliptic curve cryptosystem (ECC). The security of the proposed scheme is formally proved under the widely used random oracle model (ROM), and various known malicious attack resistances also are presented by the heuristic discussion. Compared with the existing related schemes, the computation cost and communication overhead of our scheme are reduced by 74.5% and 27.3% respectively.Entities:
Keywords: Authentication; Biometrics; Key agreement; ROM; TMIS
Year: 2022 PMID: 36250183 PMCID: PMC9553637 DOI: 10.1007/s11042-022-14007-3
Source DB: PubMed Journal: Multimed Tools Appl ISSN: 1380-7501 Impact factor: 2.577
Fig. 1Typical architecture of TMIS
Notations used in the paper
| Notation | Description |
|---|---|
| a finite field | |
| an elliptic curve defined on | |
| a based point with a big prime order | |
| the interval [1, | |
| the identity of the patient | |
| the password of the patient | |
| an extracted string | |
| a public auxiliary string | |
| the session key | |
| the server’s long-term private key | |
| the server’s public key | |
| the smart card issued to every specific patient | |
| symmetric encryption/decryption with key | |
| the one-way hash function | |
| ⊕ | XOR operation |
| ∥ | the concatenation operation |
| adversary |
Fig. 2Registration phase of Ostad-Sharif et al.’s scheme
Fig. 3Login and authentication phase of Ostad-Sharif et al.’s scheme
Fig. 4Password change phase of Ostad-Sharif et al.’s scheme
Fig. 5General flow of BBAKA protocol
Fig. 6Registration phase of BBAKA protocol
Fig. 7Login and authentication phase of BBAKA protocol
Security comparison
| scheme | [ | [ | [ | [ | [ | Our |
|---|---|---|---|---|---|---|
| Mutual authentication and key agreement | ||||||
| User anonymity | × | |||||
| User un-traceability | × | × | ||||
| Perfect forward secrecy | × | |||||
| User friendliness | × | × | ||||
| Resist stolen-verifier attack | × | × | × | |||
| Resist off-line password guessing attack | × | × | × | |||
| Resist privileged insider attack | ||||||
| Resist the user impersonation attack | ||||||
| Resist the replay attack | × | × | × | |||
| Resist man-in-the-middle attack | ||||||
| Resist the denial of service attack | × | × | × | |||
| Resist ephemeral secret leakage attack | × | × | × | |||
| Resist smart card loss attack | × |
Notations of some operations
| Notation | Meaning | Execution time (s) |
|---|---|---|
| One elliptic curve point multiplication operation | 0.063075 | |
| One symmetric encryption/decryption operation | 0.0087 | |
| One-way hash function | 0.0005 | |
| One modular exponentiation operation | 0.522 | |
| One chebyshev chaotic map | 0.066 | |
| One public key encryption/decryption | 0.522 |
Performance comparison of our protocol with the related ones
| Scheme | Execution time of | Execution time of | Total execution time (second) | Communication cost |
|---|---|---|---|---|
| [ | 7 | 7 | 14 | 1184 |
| [ | 11 | 8 | 19 | 1760 |
| [ | 7 | 9 | 16 | 1344 |
| [ | 10 | 3 | 13 | 1184 |
| [ | 2 | 2 | 4 | 1280 |
| Our | 6 | 4 | 10 | 1280 |
Fig. 8Execution time illustration of different protocols
Fig. 9Communication cost illustration of different protocols