Skip to main content
Log in

An Efficient Authentication Scheme for Telecare Medicine Information Systems

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

To ensure patients’ privacy, such as telephone number, medical record number, health information, etc., authentication schemes for telecare medicine information systems (TMIS) have been studied widely. Recently, Wei et al. proposed an efficient authentication scheme for TMIS. They claimed their scheme could resist various attacks. However, in this paper, we will show their scheme is vulnerable to an off-line password guessing attack when user’s smart card is lost. To improve the security, we propose a new authentication scheme for TMIS. The analysis shows our scheme could overcome the weaknesses in Wei et al.’s scheme and has better performance than their scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Lamport, L., Password Authentication with Insecure Communication. Comm. ACM 24(11):770–772, 1981.

    Article  MathSciNet  Google Scholar 

  2. Juang, W.-S., Wu, J.-L., An efficient two-factor authenticated key exchange protocol based on elliptic curve cryptosystems. In Proc. of The 11th information management and implementation conference (IMI’05), pp. 299–306, 2005.

  3. Mangipudi, K., Katti, R., A secure identification and key agreement protocol with user anonymity (SIKA). Comput. Secur, 25(6):420–425, 2006.

    Article  Google Scholar 

  4. Lee, N.-Y., Wu, C.-N., Wang, C.-C., Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings. Comput. Electr. Eng. 34(1):12–20, 2008.

    Article  MATH  Google Scholar 

  5. Yang, J.-H., Chang, C.-C., An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28:138–143, 2009.

    Article  Google Scholar 

  6. Wang, R.-C., Juang, W.-S., Lei, C.-L., Provably secure and efficient identification and key agreement protocol with user anonymity. J. Comput. Syst. Sci. doi: 10.1016/j.jcss.2010.07.004, 2010.

  7. He, D., Chen, J., Hu, J., An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inform. Fusion. doi: 10.1016/j.infus.2011.01.001, 2011.

  8. He, D., Chen, J., Chen, Y., A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Comm. Network. doi: 10.1002/sec.506, 2011.

  9. He, D., An efficient remote user authentication and key exchange protocol for mobile client–server environment from pairings, Ad Hoc Networks. doi: 10.1016/j.adhoc.2012.01.002, 2012.

  10. He, D., Chen, Y., Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol, Nonlinear Dynam. doi: 10.1007/s11071-012-0335-0, 2012.

  11. Wu, Z. Y., Lee, Y. C., Lai, F., Lee H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. doi: 10.1007/s10916-010-9614-9, 2010.

  12. He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. doi: 10.1007/s10916-011-9658-5, 2011.

  13. Wei, J., Hu, X., Liu, W., An Improved Authentication Scheme for Telecare Medicine Information Systems, J. Med. Syst. doi: 10.1007/s10916-012-9835-1, 2012.

  14. Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Proc. Adv. Cryptology (CRYPTO 99), pp. 388–397, 1999.

  15. Messerges T., Dabbish E., Sloan R., Examining smart-card security under the threat of power analysis attacks, IEEE Trans. Comput. 51(5):541–552, 2002.

    Article  MathSciNet  Google Scholar 

  16. PKCS, Public key cryptography standards, PKCS #1 v2.1, RSA Cryptography Standard, Draft 2, 2001. Available at http://www.rsasecurity.com/rsalabs/pkcs/

  17. Boneh, D., Twenty years of attacks on the RSA cryptosystem. Not. AMS, 46(2):203–213, 1999.

    MathSciNet  MATH  Google Scholar 

  18. Wikipedia, RSA (algorithm). Available at http://en.wikipedia.org/wiki/RSA_(algorithm)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhian Zhu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhu, Z. An Efficient Authentication Scheme for Telecare Medicine Information Systems. J Med Syst 36, 3833–3838 (2012). https://doi.org/10.1007/s10916-012-9856-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10916-012-9856-9

Keywords

Navigation