2015
DOI: 10.1007/s10916-015-0221-7
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem

Abstract: The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient’s privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al.(J Med Syst 38(12): 2014… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
78
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 101 publications
(83 citation statements)
references
References 39 publications
0
78
0
Order By: Relevance
“…However, our improved scheme can achieve all the security requirements listed in Table 1. From Table 2, we can conclude that our scheme is more efficient than the other two schemes [8,3]. …”
Section: Performance Comparisonsmentioning
confidence: 82%
See 1 more Smart Citation
“…However, our improved scheme can achieve all the security requirements listed in Table 1. From Table 2, we can conclude that our scheme is more efficient than the other two schemes [8,3]. …”
Section: Performance Comparisonsmentioning
confidence: 82%
“…In order to evaluate the security performance of our scheme, we compare the two related schemes [8,3] with our scheme in Table 1. The efficiency comparison in terms of computational overhead among the related schemes and our proposed scheme is shown in Table 2.…”
Section: Performance Comparisonsmentioning
confidence: 99%
“…Xu and Wu [43] illustrated that Xie et al's [42] suffers from de-synchronization attack and heavy storage burden in server and also proposed an improved scheme. Thereafter, Lu et al [30] also pointed out that the Arshad's [8] scheme cannot achieve complete security requirements and proposed an authentication scheme based on the elliptic curve cryptosystem. Very recently, Zhang-Zhu [45] pointed out that the Islam-Khan's [17] scheme is insecure against several security weaknesses and also proposed a improved scheme to enhance the mentioned security flaws.…”
Section: Introductionmentioning
confidence: 99%
“…The main advantageous property of the biometrics is uniqueness, leading to the proposal of numerous. In the view of fact that several biometric-based remote user authenticati on schemes using smart card [6][7][8] have been proposed.…”
Section: Introductionmentioning
confidence: 99%