skip to main content
10.1145/3340037.3340064acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmhiConference Proceedingsconference-collections
research-article

Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems

Published: 17 May 2019 Publication History

Abstract

A three-party encrypted key exchange (3PEKE) protocol for telecare medicine information systems (TMISs) enables two communicating parties, such as patients, doctors, nurses and health visitors, sharing a long-lived secret only with a trusted third party- Medical Center Server (MCS) to exchange confidential and authenticated Electronic Medical Records (EMRs) and Electronic Health Records (EHRs) with another party over an insecure network. Recently, Lee et al. presented an improved 3PEKE protocol to solve the weaknesses of previous protocols. However, this study states that Lee et al.'s improved 3PEKE protocol still has some security faults such that their protocol cannot execute correctly and fails to resist password guessing attacks. This study also develops an enhanced protocol which is based on Lee et al.'s improved 3PEKE protocol. Additionally, the enhanced protocol protects the user's password by using a one-time key shared with the MCS, eliminates the redundant computations, and rearranges the messages. Compared with related protocols, the enhanced protocol not only has higher security, but also increases efficiency in computation and transmission.

References

[1]
Chang, C.C., and Chang, Y.F., A novel three-party encrypted key exchange protocol, Computer Standards & Interfaces, 26 (5), (2004), 471--476.
[2]
Bellare, M, Halevi, S, Sahai, A, and Vadhan, S,. Many-to-one trapdoor functions and their relations to public-key cryptosystems, Proceedings of the CRYPTO'98, of LNCS, 1462, (1998), 283--298.
[3]
Goldreich, O, and Levin, L., A hard-core predicate for all one-way functions, Proceedings of the 21st ACM Symposium on the Theory of Computing, (1989), 25--32.
[4]
Impagaliazzo, R, and Rudich, S., Limits on the provable consequences of one-way permutations, Proceedings of the 21st ACM Symposium on the Theory of Computing, (1989), 44--61.
[5]
Chen, H.B., and Chen, T.H., Lee W.B., and Chang C.C., Security enhancement for a three-party encrypted key exchange protocol against undetectable online password guessing attacks, Computer Standards & Interfaces, 30, (2008), 95--99.
[6]
Yoon, E.J., and Yoo, K.Y., Improving the novel three-party encrypted key exchange protocol, Computer Standards & Interfaces, 30, (2008), 309--314.
[7]
Lo, N.W., and Yeh K.H., Cryptanalysis of two three-party encrypted key exchange protocols, Computer Standards & Interfaces, 31, (2009), 1167--1174.
[8]
Chang, Y.F., A practical three-party encrypted key exchange protocol with round efficiency, International Journal of Innovative Computing, Information and Control, 4 (4), (2008) 953--960.
[9]
Lee, C.C., and Y.F. Chang, On security of a practical three-party key exchange protocol with round efficiency, Information Technology and Control, 37(4), (2008), 333--335.
[10]
Lee, C.C., Chen, S.D., and Chen, C.L., A computation-efficient three-party encrypted key exchange protocol, Applied Mathematics & Information Sciences, 6(3), (2012), 573--579.
[11]
Diffie, W., and Hellman M., New directions in cryptography, IEEE Transactions on Information Theory, 22 (6), (1976), 644--654.

Cited By

View all

Index Terms

  1. Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICMHI '19: Proceedings of the 3rd International Conference on Medical and Health Informatics
    May 2019
    207 pages
    ISBN:9781450371995
    DOI:10.1145/3340037
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • University of Electronic Science and Technology of China: University of Electronic Science and Technology of China

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 May 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Authentication
    2. TMISs
    3. encrypted key exchange
    4. medical information security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • Tzu Chi University

    Conference

    ICMHI 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 72
      Total Downloads
    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media