Skip to main content
Log in

A Hybrid Quantum Key Distribution Protocol for Tele-care Medicine Information Systems

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The Internet has become an increasingly appealing medium for telecare medicine information systems (TMISs). However, the open nature of the Internet poses serious security threats and vulnerabilities to TMISs and privacy concerns to the patients and medical personnel. This work proposes a hybrid quantum key distribution protocol to provide security in TMISs, leveraging the key agreement of classical and quantum key distribution. Our protocol induces low energy and computation overheads to achieve privacy and trusted operations for TMISs. This is because quantum key distribution employs the principles of quantum mechanics rather than computational complexity, to avoid various attacks such as the man-in-the-middle attacks, the replay attacks and the passive attacks. Meanwhile, classical cryptography can be used to achieve user authentication efficiently. Therefore, our protocol may be available with the rapid developments of extensive experiments for quantum key distribution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Wen, F., & Guo, D. (2015). An improved anonymous authentication scheme for telecare medical information systems. Journal of Medical Systems, 36(5), 1–11.

    MathSciNet  Google Scholar 

  2. Pu, Q., Wang, J., & Zhao, R. Y. (2012). Strong authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(4), 2609–2619.

    Article  Google Scholar 

  3. Arshad, H., & Nikooghadam, M. (2014). Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 38, 136.

    Article  Google Scholar 

  4. Xie, Q., Zhang, J., & Dong, N. (2013). Robust anonymous authentication scheme for telecare medical information systems. Journal of Medical Systems, 37, 9911.

    Article  Google Scholar 

  5. He, D., Chen, J., & Zhang, R. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1989–1995.

    Article  Google Scholar 

  6. Nikooghadam, M., & Zakerolhosseini, A. (2012). Secure communication of medical information using mobile agents. Journal of Medical Systems, 36(6), 3839–3850.

    Article  Google Scholar 

  7. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594–608.

    Article  Google Scholar 

  8. Zhou, Z. L., Yang, C. N., Chen, B. J., Sun, X. M., Liu, Q., & Wu, Q. J. (2016). Effective and efficient image copy detection with resistance to rrbitrary rotation. IEICE Transactions on Information and Systems., 99(6), 1531–1540.

    Article  Google Scholar 

  9. Yuan, C. S., Sun, X. M., & Rui, L. V. (2016). Fingerprint liveness detection based on multi-scale LPQ and PCA. China Communications, 13(7), 60–65.

    Article  Google Scholar 

  10. Fu, Z. J., Ren, K., Shu, J. G., Sun, X. M., & Huang, F. X. (2016). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems, 27(9), 2546C2559.

    Article  Google Scholar 

  11. Zhou, Z. L., Wang, Y. L., Wu, Q. J., Yang, C. N., & Sun, X. M. (2017). Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security, 12(1), 48–63.

    Article  Google Scholar 

  12. Li, J., Li, X. J., Yang, B., & Sun, X. M. (2015). Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security, 10(3), 507–518.

    Article  Google Scholar 

  13. Lee, T. F., & Liu, C. M. (2013). A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. Journal of Medical Systems, 37, 9933.

    Article  Google Scholar 

  14. Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., & He, L. (2014). A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems. Journal of Medical Systems, 38(1), 1–7.

    Article  Google Scholar 

  15. Xia, Z. H., Wang, X. H., Sun, X. M., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.

    Article  Google Scholar 

  16. Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: public-key distribution and coin tossing. In Proceedings of the IEEE international conference on computers, systems and signal processing (Bangalore, India) (pp. 175-179). New York: IEEE.

  17. Muller, A., Breguet, J., & Gisin, N. (1993). Experimental demonstration of quantum cryptography using polarized photons in optical fibre over more than 1 km. Europhysics Letter, 23(6), 383–388.

    Article  Google Scholar 

  18. Inagaki, T., Matsuda, N., Tadanaga, O., Nishida, Y., Asobe, M., & Takesue, H. (2013). Long distance distribution of entangled photon pair over 300 km of fiber. Optics Express, 21(20), 23241–23249.

    Article  Google Scholar 

  19. Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299(5886), 802–803.

  20. Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145.

    Article  MATH  Google Scholar 

  21. Merkle, R. C. (1989). One way hash functions and DES. Conference on the theory and application of cryptology (pp. 428–446). New York: Springer.

  22. Chen, L. X., & She, W. L. (2009). Encoding orbital angular momentum onto multiple spin states based on a Huffman tree. New Journal of Physics, 11, 1–8.

    Google Scholar 

  23. Lai, H., Orgun, M. A., Xiao, J. H., Pieprzyk, J., Xue, L., & YYang, Y. X. (2014). Provably secure three-party key agreement protocol using Chebyshev maps in the standard model. Nonlinear Dynamics, 4, 1427–1439.

    Article  MathSciNet  MATH  Google Scholar 

  24. Jain, N., Stiller, B., Khan, I., Makarov, V., Marquardt, Ch., & Leuchs, G. (2015). Risk analysis of Trojan-horse attacks on practical quantum key distribution systems. IEEE Journal of Selected Topics in Quantum Electronics, 21, 6600710.

    Article  Google Scholar 

Download references

Acknowledgements

Hong Lai has been supported by the National Natural Science Foundation of China (No. 61702427), the Fundamental Research Funds for the Central Universities (No. XDJK2016C043) and the Doctoral Program of Higher Education (No. SWU115091), and the financial support in part by the 1000-Plan of Chongqing by Southwest University (No. SWU116007). Mingxing Luo is supported by the National Natural Science Foundation of China (No. 61772437, 61303039), and Sichuan Youth Science & Technique Foundation (No. 2017JQ0048). Fuyuan Xiao is supported by the Fundamental Research Funds for the Central Universities (No. XDJK2015C107) and the Doctoral Program of Higher Education (No. SWU115008). The paper is also supported by A Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hong Lai or Mehmet A. Orgun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lai, H., Luo, M., Qu, Z. et al. A Hybrid Quantum Key Distribution Protocol for Tele-care Medicine Information Systems. Wireless Pers Commun 98, 929–943 (2018). https://doi.org/10.1007/s11277-017-4902-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4902-z

Keywords

Navigation