Secure Verifier-Based Three-Party Authentication Schemes without Server Public Keys for Data Exchange in Telecare Medicine Information Systems
- 302 Downloads
Secure verified-based three-party authentication scheme for data exchange in telecare medicine information systems enables two users only store their verifiers computed from their actual password in authentication server’s database. Then the authentication server can verify the users’ verifiers and help them to exchange electronic medical records or electronic health records securely and conveniently. This investigation presents an efficient and secure verified-based three-party authentication scheme for data exchange in telecare medicine information systems. The proposed scheme does not use server’s public keys and includes the key confirmation without extra numbers of messages and rounds. Compared to related verified-based approaches, the proposed scheme possesses higher security, has lower computational cost and fewer transmissions, and thus is suitable for the telecare medicine information systems.
KeywordsTelecare medicine information system Data exchange Authentication Verifier-based
The authors would like to thank the anonymous referees for their valuable comments and suggestions. This research was supported by National Science Council under the grants NSC102-2221-E-320-003 and TCRPP102010.
- 10.Yeh, H.-T., Sun, H.-M., and Hwang, T., Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. Inf. Sci. Eng. 19(6):1059–1070, 2003.Google Scholar
- 16.Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. Proc. of Advances in Cryptology–Eurocrypt 2000. Lect. Notes Comput. Sci 1807: 122–138, 2000.Google Scholar
- 17.Boyko, V., MacKenzie, P., and Patel, S., Provably secure password based authenticated key exchange protocols using Diffie-Hellman. Proc. of Advances in Cryptology–Eurocrypt 2000. Lect. Notes Comput. Sci 1807: 156–171, 2000.Google Scholar
- 20.Impagliazzo, I., and Shoup, V., A note on an encryption scheme of Kurosawa and Desmedt. Available at http://eprint.iacr.org/2004/194, 2004.
- 21.Shoup, V., Sequences of games: A tool for taming complexity in security proofs. Available at http://www.shoup.net, 2005.