An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems
- 569 Downloads
- 18 Citations
Abstract
A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.
Keywords
Telecare medicine information system Chaotic maps Authentication Smartcard Key agreementNotes
Acknowledgments
The authors would like to thank the editor and the anonymous referees for their valuable comments. This research was supported by National Science Council under the grants NSC102-2221-E-320-003. Ted Knoy is appreciated for his editorial assistance.
References
- 1.Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.CrossRefGoogle Scholar
- 2.Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRefGoogle Scholar
- 3.Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRefGoogle Scholar
- 4.He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRefGoogle Scholar
- 5.Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRefGoogle Scholar
- 6.Lee, T.-F., and Liu, C.-M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 2013. doi: 10.1007/s10916-013-9933-8.Google Scholar
- 7.Juang, W., Efficient password authenticated key agreement using smart cards. Comput. Secur. 23:167–173, 2004.CrossRefGoogle Scholar
- 8.Fan, C. I., Chan, Y. C., and Zhang, Z. K., Robust remote authentication scheme with smart cards. Comput. Secur. 24:619–628, 2005.CrossRefGoogle Scholar
- 9.Juang, W. S., Chen, S. T., and Liaw, H. T., Robust and efficient password-authenticated key agreement using smart card. IEEE Trans. Ind. Electron. 55:2551–2556, 2008.CrossRefMATHGoogle Scholar
- 10.Sun, D. Z., Huai, J. P., Sun, J. Z., Li, J. X., Zhang, J. W., and Feng, Z. Y., Improvements of Juang et al’.s password-authenticated key agreement scheme using smart cards. IEEE Trans. Ind. Electron. 56:2284–2291, 2009.CrossRefGoogle Scholar
- 11.Yeh, K. H., Su, C., Lo, N. W., Li, Y. J., and Hung, Y. X., Two robust remote user authentication protocols using smart cards. J. Syst. Softw. 83:2556–2565, 2010.CrossRefGoogle Scholar
- 12.Li, X. X., Qiu, W. D., Zheng, D., Chen, K. F., and Li, J. H., Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57:780–793, 2010.Google Scholar
- 13.Xiao, D., Liao, X., and Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177:1136–1142, 2007.MathSciNetCrossRefGoogle Scholar
- 14.Han, S., Security of a key agreement protocol based on chaotic maps. Chaos, Solitons Fractals 38:764–768, 2008.MathSciNetCrossRefMATHGoogle Scholar
- 15.Xiao, D., Liao, X. F., and Deng, S. J., Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178:1598–1602, 2008.MathSciNetCrossRefMATHGoogle Scholar
- 16.Yoon, E. J. and Yoo, K. Y., A new key agreement protocol based on chaotic maps. Proceedings of The Second KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA’08), 897–906, 2008.Google Scholar
- 17.Tseng, H., Jan, R. and Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun. (ICC09), 1–6, 2009.Google Scholar
- 18.Wang, X., and Zhao, J., An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15:4052–4057, 2010.MathSciNetCrossRefMATHGoogle Scholar
- 19.Guo, X. F., and Zhang, J. S., Secure group key agreement protocol based on chaotic hash. Inf. Sci. 180:4069–4074, 2010.CrossRefMATHGoogle Scholar
- 20.Niu, Y., and Wang, X., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16:1986–1992, 2011.MathSciNetCrossRefMATHGoogle Scholar
- 21.Xue, K., and Hong, P., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17:2969–2977, 2012.MathSciNetCrossRefMATHGoogle Scholar
- 22.Kocarev, L., and Tasev, Z., Public-key encryption based on Chebyshev maps. Proc. Int. Symp. Circ. Syst. 3:III-28–III-31, 2003.Google Scholar
- 23.Mason, J. C., and Handscomb, D. C., Chebyshev polynomials. Chapman & Hall/CRC, Boca Raton, 2003.MATHGoogle Scholar
- 24.Bergamo, P., D’Arco, P., Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst.-I 52:1382–1393, 2005.CrossRefGoogle Scholar
- 25.Guo, C., and Chang, C. C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18:1433–1440, 2013.MathSciNetCrossRefGoogle Scholar
- 26.Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37:9919, 2013. doi: 10.1007/s10916-012-9919-y.CrossRefGoogle Scholar