Skip to main content

Advertisement

Log in

A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

In recent years, the increased availability of lower-cost telecommunications systems and customized patients monitoring devices made it possible to bring the advantages of telemedicine directly into the patient’s home. These telecare medicine information systems enable health-care delivery services. These systems are moving towards an environment where automated patient medical records and electronically interconnected telecare facilities are prevalent. Authentication, security, patient’s privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). A secure authentication scheme will be required to achieve these goals. Many schemes based on cryptography have been proposed to achieve the goals. However, many schemes are vulnerable to various attacks, and are neither efficient, nor user friendly. Specially, in terms of efficiency, some schemes are resulting in high time cost. In this paper we propose a new authentication scheme that is using the precomputing to avoid the time-consuming exponential computations. Finally, it is shown to be more secure and practical for telecare medicine environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Menezes, A. J., Oorschot, P. C., and Vanstone, S. A., Handbook of applied cryptography. CRC Press, 1997.

  2. Chang, C. C., and Hwang, K. F., Some forgery attack on a remote user authentication scheme using smart card. Informatica 14(3):289–294, 2003.

    MathSciNet  MATH  Google Scholar 

  3. Chan C. K., and Cheng, L. M., Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):992–993, 2000.

    Article  Google Scholar 

  4. Deng, S., Xiao, D., Liao, X., One-way hash function construction based on chaotic map with changeable parameter. Chaos, Solitons Fractals 24:65–71, 2005.

    MathSciNet  MATH  Google Scholar 

  5. Sun, H. M., An efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):958–961, 2000.

    Article  Google Scholar 

  6. Yeh, H. T., Sun, H. M., and Hsieh, B. T., Security of a remote user authentication scheme using smart cards. IEICE Trans. Commun. B(1)(E87):192–194, 2004.

    Google Scholar 

  7. Hwang, T., Chen, Y., and Laih, C.-S., Non-interactive password authentications without password tables. In: Computer and Communication Systems, 1990. IEEE TENCON’90., 1990 IEEE Region 10 Conference on, Vol. 1, pages 429–431, 1990.

  8. Liu S., and Sun, L., Cryptographic pseudo random sequence from spatial chaotic map. Chaos, Solitions Fractals 41:2216–2229, 2009.

    Article  Google Scholar 

  9. Lamport, L., Password authentication with insecure communication. Commun. ACM 24:770–772, 1981.

    Article  Google Scholar 

  10. Sandirigama, M., Shimizu, A., and Noda, M. T., Simple and secure password authentication protocol(sas). IEICE Trans. Commun. B(6)(E83):1363–1365, 2000.

    Google Scholar 

  11. Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart card. IEEE Trans. Consum. Electron. 46(1):28–30, 2000.

    Article  Google Scholar 

  12. Haller, N. H., The s/key(tm) one time password system. In: Proceedings Internet Society Symposium on Network and Distributed System Seurity, pages 151-158, 1994.

  13. Elgamal, T., A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Inf. Theory 31(4):469–472, 1985.

    Article  Google Scholar 

  14. Chen T. H., and Lee, W. B., A new method for using hash function to solve remote user authentication. Comput. Electr. Eng. 34(1):53–62, 2008.

    Article  MathSciNet  MATH  Google Scholar 

  15. Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit K. Awasthi.

Additional information

Conflict of interests

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Awasthi, A.K., Srivastava, K. A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce. J Med Syst 37, 9964 (2013). https://doi.org/10.1007/s10916-013-9964-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-013-9964-1

Keywords