Skip to main content

Advertisement

Log in

An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.

    Article  Google Scholar 

  2. Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.

    Article  Google Scholar 

  3. Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.

    Article  Google Scholar 

  4. He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.

    Article  Google Scholar 

  5. Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.

    Article  Google Scholar 

  6. Lee, T.-F., and Liu, C.-M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 2013. doi:10.1007/s10916-013-9933-8.

    Google Scholar 

  7. Juang, W., Efficient password authenticated key agreement using smart cards. Comput. Secur. 23:167–173, 2004.

    Article  Google Scholar 

  8. Fan, C. I., Chan, Y. C., and Zhang, Z. K., Robust remote authentication scheme with smart cards. Comput. Secur. 24:619–628, 2005.

    Article  Google Scholar 

  9. Juang, W. S., Chen, S. T., and Liaw, H. T., Robust and efficient password-authenticated key agreement using smart card. IEEE Trans. Ind. Electron. 55:2551–2556, 2008.

    Article  MATH  Google Scholar 

  10. Sun, D. Z., Huai, J. P., Sun, J. Z., Li, J. X., Zhang, J. W., and Feng, Z. Y., Improvements of Juang et al’.s password-authenticated key agreement scheme using smart cards. IEEE Trans. Ind. Electron. 56:2284–2291, 2009.

    Article  Google Scholar 

  11. Yeh, K. H., Su, C., Lo, N. W., Li, Y. J., and Hung, Y. X., Two robust remote user authentication protocols using smart cards. J. Syst. Softw. 83:2556–2565, 2010.

    Article  Google Scholar 

  12. Li, X. X., Qiu, W. D., Zheng, D., Chen, K. F., and Li, J. H., Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57:780–793, 2010.

    Google Scholar 

  13. Xiao, D., Liao, X., and Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177:1136–1142, 2007.

    Article  MathSciNet  Google Scholar 

  14. Han, S., Security of a key agreement protocol based on chaotic maps. Chaos, Solitons Fractals 38:764–768, 2008.

    Article  MathSciNet  MATH  Google Scholar 

  15. Xiao, D., Liao, X. F., and Deng, S. J., Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178:1598–1602, 2008.

    Article  MathSciNet  MATH  Google Scholar 

  16. Yoon, E. J. and Yoo, K. Y., A new key agreement protocol based on chaotic maps. Proceedings of The Second KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA’08), 897–906, 2008.

  17. Tseng, H., Jan, R. and Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun. (ICC09), 1–6, 2009.

  18. Wang, X., and Zhao, J., An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15:4052–4057, 2010.

    Article  MathSciNet  MATH  Google Scholar 

  19. Guo, X. F., and Zhang, J. S., Secure group key agreement protocol based on chaotic hash. Inf. Sci. 180:4069–4074, 2010.

    Article  MATH  Google Scholar 

  20. Niu, Y., and Wang, X., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16:1986–1992, 2011.

    Article  MathSciNet  MATH  Google Scholar 

  21. Xue, K., and Hong, P., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17:2969–2977, 2012.

    Article  MathSciNet  MATH  Google Scholar 

  22. Kocarev, L., and Tasev, Z., Public-key encryption based on Chebyshev maps. Proc. Int. Symp. Circ. Syst. 3:III-28–III-31, 2003.

    Google Scholar 

  23. Mason, J. C., and Handscomb, D. C., Chebyshev polynomials. Chapman & Hall/CRC, Boca Raton, 2003.

    MATH  Google Scholar 

  24. Bergamo, P., D’Arco, P., Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst.-I 52:1382–1393, 2005.

    Article  Google Scholar 

  25. Guo, C., and Chang, C. C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18:1433–1440, 2013.

    Article  MathSciNet  Google Scholar 

  26. Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37:9919, 2013. doi:10.1007/s10916-012-9919-y.

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the editor and the anonymous referees for their valuable comments. This research was supported by National Science Council under the grants NSC102-2221-E-320-003. Ted Knoy is appreciated for his editorial assistance.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tian-Fu Lee.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, TF. An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems. J Med Syst 37, 9985 (2013). https://doi.org/10.1007/s10916-013-9985-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-013-9985-9

Keywords

Navigation