A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems
Telecare medical information systems (TMIS), with the explosive growth of communication technology and physiological monitoring devices, are applied increasingly to enable and support healthcare delivery services. In order to safeguard patients’ privacy and tackle the illegal access, authentication schemes for TMIS have been investigated and designed by many researchers. Many of them are promising for adoption in practice, nevertheless, they still have security flaws. In this paper, we propose a novel remote authentication scheme for TMIS using self-certified public keys, which is formally secure in the ID-mBJM model. Besides, the proposed scheme has better computational efficiency. Compared to the related schemes, our protocol is more practical for telemedicine system.
KeywordsTelecare medical information systems Authentication Anonymity Bilinear pairings Provable security
The authors are grateful to the editor and anonymous reviewers for their valuable suggestions, which improved the paper. This work is supported by NSFC (Grant Nos. 61300181, 61202434), the Fundamental Research Funds for the Central Universities (Grant No. 2015RC23).
- 2.Wen, F.T., Susilo, W., Yang, G.M., A robust smart card-based anonymous user authentication protocol for wireless communications. Security Comm. Networks 7(6):987C993, 2013.Google Scholar
- 24.Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. Proceedings of Advances in Cryptology, Santa Barbara, CA, U.S.A., pp. 388–397 (1999)Google Scholar
- 27.Joux, A., A one round protocol for tripartite Diffie? CHellman 4th International Symposium on Algorithmic Number Theory, Lecture Notes in Comput. Sci. Vol. 1838, p. 385C394. New York: Springer, 2000.Google Scholar
- 30.Kudla, C., Special signature schemes and key agreement protocols, PH.D. Thesis: Royal Holloway University of London , 2006.Google Scholar
- 31.Kudla, C., and Paterson, K.: Modular security proofs for key agreement protocols. In: Proceedings ASIACRYPT’05, LNCS, Vol. 3788, pp. 549–565 (2005)Google Scholar