2015
DOI: 10.1007/s10916-015-0233-3
|View full text |Cite
|
Sign up to set email alerts
|

Robust ECC-based Authenticated Key Agreement Scheme with Privacy Protection for Telecare Medicine Information Systems

Abstract: To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
19
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(19 citation statements)
references
References 32 publications
0
19
0
Order By: Relevance
“…But, elliptic curve cryptosystem (ECC) is used to design an authentication scheme due to its small key size than RSA‐based cryptosystem. Therefore, ECC‐based authentication schemes have been developed by the researchers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…But, elliptic curve cryptosystem (ECC) is used to design an authentication scheme due to its small key size than RSA‐based cryptosystem. Therefore, ECC‐based authentication schemes have been developed by the researchers.…”
Section: Introductionmentioning
confidence: 99%
“…In , Chaudhry et al pointed out that Islam and Khan's scheme cannot prevent forgery attack and then designed another improved scheme. Furthermore, Zhang and Zhu disclosed that scheme in also suffers from off‐line password guessing and server spoofing attacks, respectively. Li et al , introduced a user authentication scheme with the ECC; however, Mishra et al highlighted that the scheme of Li et al , suffers from password guessing attack and replay attack.…”
Section: Introductionmentioning
confidence: 99%
“…Thereafter, Lu et al [30] also pointed out that the Arshad's [8] scheme cannot achieve complete security requirements and proposed an authentication scheme based on the elliptic curve cryptosystem. Very recently, Zhang-Zhu [45] pointed out that the Islam-Khan's [17] scheme is insecure against several security weaknesses and also proposed a improved scheme to enhance the mentioned security flaws. Recently, Giri et al [11] illustrated that the Khan et al's is insecure against off-line password guessing attack and they also proposed an improved scheme to withstand the mentioned attack.…”
Section: Introductionmentioning
confidence: 99%
“…In order to overcome the above defects, they proposed a new anonymous two-factor authentication protocol for TMIS. Recently, Zhang and Zhou ( 2015 ) pointed out that Islam et al’s protocol has many security defects such as: (1) Any legal but malicious patient can reveal other user’s identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if he knows legal user’s identity. Zhang et al then proposed a new ECC-based authenticated key agreement scheme in order to fix the above security problems.…”
Section: Introductionmentioning
confidence: 99%