当前位置: X-MOL 学术J. Supercomput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function
The Journal of Supercomputing ( IF 2.5 ) Pub Date : 2021-01-19 , DOI: 10.1007/s11227-020-03553-y
Vishesh P. Gaikwad , Jitendra V. Tembhurne , Chandrashekhar Meshram , Cheng-Chi Lee

Telecare medicine information system (TMIS) is recognized as an important tool for improving the quality and protection of healthcare services. In addition to protecting the privacy of patients, many authentication techniques are being introduced in TMIS. After investigations, it is observed that many authentication techniques have security breaches. In this article, we propose an efficient, secure and lightweight authentication scheme for TMIS using chaotic hash function to achieve user anonymity. Chaotic hash function constitutes potential security a set in modern cryptography with its random behavior. Also, we provide the security proof in the random oracle (RO) model and proof of correctness of algorithm is presented using (Burrows–Abadi–Needham) BAN logic for proposed scheme. The comprehensive formal and informal security review demonstrate that the security of our scheme is resistive against known potential attacks. Additionally, our presented authentication scheme performs significantly better as compared to other existing schemes in the literature and also it is efficient on the basis on high security and low cost for computational and communication.



中文翻译:

可证明的安全的轻量级客户端身份验证方案,使用混沌哈希函数对TMIS进行匿名处理

远程医疗医学信息系统(TMIS)被认为是提高医疗服务质量和保护其重要工具。除了保护患者的隐私外,TMIS还引入了许多身份验证技术。经过调查,可以发现许多身份验证技术都存在安全漏洞。在本文中,我们提出了一种有效的,安全的,轻巧的TMIS身份验证方案,该方案使用混沌哈希函数来实现用户匿名。混沌散列函数以其随机行为构成了现代密码学中潜在的安全性。此外,我们在随机预言机(RO)模型中提供了安全性证明,并针对提出的方案使用(Burrows–Abadi–Needham)BAN逻辑提供了算法正确性的证明。全面的正式和非正式安全审查表明,我们计划的安全性可以抵抗已知的潜在攻击。另外,与文献中的其他现有方案相比,我们提出的认证方案的性能明显更好,并且基于高安全性和低成本的计算和通信,它是高效的。

更新日期:2021-01-19
down
wechat
bug