2011
DOI: 10.1007/s10916-011-9735-9
|View full text |Cite
|
Sign up to set email alerts
|

Strong Authentication Scheme for Telecare Medicine Information Systems

Abstract: The telecare medicine information system enables or supports health-care delivery services. A secure authentication scheme will thus be needed to safeguard data integrity, confidentiality, and availability. In this paper, we propose a generic construction of smart-card-based password authentication protocol and prove its security. The proposed framework is superior to previous schemes in three following aspects : (1) our scheme is a true two-factor authentication scheme. (2) our scheme can yield a forward secu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
19
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(19 citation statements)
references
References 32 publications
(49 reference statements)
0
19
0
Order By: Relevance
“…Moreover, Zhu et al [17] also identified the offline password guessing attacks in these schemes. To overcome issues in [17], Pu et al [18] has devised a new user authentication scheme applying smart care which is a user password-based identification that provides user anonymity. This scheme is based on an elliptic curve cryptosystem that provides the same security level as RSA with less key size.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Moreover, Zhu et al [17] also identified the offline password guessing attacks in these schemes. To overcome issues in [17], Pu et al [18] has devised a new user authentication scheme applying smart care which is a user password-based identification that provides user anonymity. This scheme is based on an elliptic curve cryptosystem that provides the same security level as RSA with less key size.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Little latter, Pu et al [10] proposed an anonymous authentication scheme using elliptic curve cryptosystems for TMIS. Unfortunately, their scheme has high cost of communication, computation and storage.…”
Section: Introductionmentioning
confidence: 99%
“…To address the above discussed issues, a number of password based authentication schemes have been presented for TMIS [4,13,29,36,38,[41][42][43][44]. In 2010, Wu et al [41] presented an efficient authentication scheme for TMIS.…”
Section: Introductionmentioning
confidence: 99%