A Robust and Novel Dynamic-ID-based Authentication Scheme for Care Team Collaboration with Smart Cards
- 311 Downloads
Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.
KeywordsCare team collaboration Dynamic ID Authentication Smart card Multi-server Elliptic curve cryptosystem (ECC)
This work was supported in part by National Science Council under the grants NSC 99-2410-H-025-010-MY2, NSC 101-2410-H-025 -009 -MY2, and NSC 101-2622-E-029-002-CC3.
- 8.Chang, C. C. and Lee, J. S., An efficient and secure multi-server password authentication scheme using smart cards. Proceedings of 3rd International Conference on Cyberworlds (CW 2004), Tokyo, Japan; Nov. 2004. p. 417–22.Google Scholar
- 12.Lee, C. C., Lin, T. H., and Chang, R. X., A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Syst. Appl. 38(11):13863–13870, 2011.Google Scholar
- 13.Kocher, P., Jaffe, J. and Jun, B., Differential power analysis. Proceedings of the 19th Annual International Cryptology Conference (CRYPTO’99), Santa Barbara, California, USA; Aug. 1999. p. 388–97.Google Scholar
- 15.Chang, Y. F. and Chang, P. Y., Comments on a dynamic-ID-based remote user authentication scheme for multi-server environment using smart cards. Proceedings of the 6th International Conference on Genetic and Evolutionary Computing (ICGEC 2012), Kitakyushu, Japan; August 2012. p. 59–62.Google Scholar
- 20.Miller, V. S., Use of elliptic curves in cryptography. Proceedings of the 5th Annual International Cryptology Conference (CRYPTO’85), Santa Barbara, California, USA; Aug. 1986. p. 417–26.Google Scholar
- 22.Jena, D., Jena, S. K., Mohanty, D., and Panigrahy, S. K., A novel remote user authentication scheme using smart card based on ECDLP. Proceedings of the 3rd International Conference on Advanced Computer Control (ICACC 2009), Singapore; Jan. 2009. p. 246–9.Google Scholar
- 24.Gura, N., Patel, A., Wander, A., Eberle, H. and Shantz, S. C., Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Proceedings of the 6th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), Cambridge, MA, USA; Aug. 2004. p. 925–43.Google Scholar
- 25.Krawczyk, H. and Rabin, T. Chameleon signature. Proceedings of the 2000 Network and Distributed System Security Symposium (NDSS 2000), San Diego, California, USA; Feb. 2000. p. 143–54.Google Scholar