Abstract
In recent years, the increased availability of lower-cost telecommunications systems and customized patients monitoring devices made it possible to bring the advantages of telemedicine directly into the patient’s home. These telecare medicine information systems enable health-care delivery services. These systems are moving towards an environment where automated patient medical records and electronically interconnected telecare facilities are prevalent. Authentication, security, patient’s privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). A secure authentication scheme will be required to achieve these goals. Many schemes based on cryptography have been proposed to achieve the goals. However, many schemes are vulnerable to various attacks, and are neither efficient, nor user friendly. Specially, in terms of efficiency, some schemes are resulting in high time cost. In this paper we propose a new authentication scheme that is using the precomputing to avoid the time-consuming exponential computations. Finally, it is shown to be more secure and practical for telecare medicine environments.


Similar content being viewed by others
References
Menezes, A. J., Oorschot, P. C., and Vanstone, S. A., Handbook of applied cryptography. CRC Press, 1997.
Chang, C. C., and Hwang, K. F., Some forgery attack on a remote user authentication scheme using smart card. Informatica 14(3):289–294, 2003.
Chan C. K., and Cheng, L. M., Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):992–993, 2000.
Deng, S., Xiao, D., Liao, X., One-way hash function construction based on chaotic map with changeable parameter. Chaos, Solitons Fractals 24:65–71, 2005.
Sun, H. M., An efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):958–961, 2000.
Yeh, H. T., Sun, H. M., and Hsieh, B. T., Security of a remote user authentication scheme using smart cards. IEICE Trans. Commun. B(1)(E87):192–194, 2004.
Hwang, T., Chen, Y., and Laih, C.-S., Non-interactive password authentications without password tables. In: Computer and Communication Systems, 1990. IEEE TENCON’90., 1990 IEEE Region 10 Conference on, Vol. 1, pages 429–431, 1990.
Liu S., and Sun, L., Cryptographic pseudo random sequence from spatial chaotic map. Chaos, Solitions Fractals 41:2216–2229, 2009.
Lamport, L., Password authentication with insecure communication. Commun. ACM 24:770–772, 1981.
Sandirigama, M., Shimizu, A., and Noda, M. T., Simple and secure password authentication protocol(sas). IEICE Trans. Commun. B(6)(E83):1363–1365, 2000.
Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart card. IEEE Trans. Consum. Electron. 46(1):28–30, 2000.
Haller, N. H., The s/key(tm) one time password system. In: Proceedings Internet Society Symposium on Network and Distributed System Seurity, pages 151-158, 1994.
Elgamal, T., A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Inf. Theory 31(4):469–472, 1985.
Chen T. H., and Lee, W. B., A new method for using hash function to solve remote user authentication. Comput. Electr. Eng. 34(1):53–62, 2008.
Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
Author information
Authors and Affiliations
Corresponding author
Additional information
Conflict of interests
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Awasthi, A.K., Srivastava, K. A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce. J Med Syst 37, 9964 (2013). https://doi.org/10.1007/s10916-013-9964-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-013-9964-1