Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems

2014 ◽  
Vol 117 (3) ◽  
pp. 464-472 ◽  
Author(s):  
Tian-Fu Lee
2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Yanrong Lu ◽  
Dawei Zhao

Telecare medicine information systems (TMISs) provide e-health services such that patients can access medical resources conveniently and doctors can prescribe treatments rapidly. Authentication is an essential security requirement in TMISs. In particular, the growth of password-based remote patient authenticated key exchange combining extended chaotic maps has enhanced the level of secure communications for TMISs. Recently, Lee suggested an improved random-number-based password-authenticated key exchange (PAKE) using extended chaotic maps and synchronized-clock-based PAKE using extended chaotic maps on Guo and Zhang and Xiao et al.’s PAKE. Unfortunately, we found that the nonce-based scheme of Lee is insecure against known session-specific temporary information and server spoofing attacks. To cope with the aforementioned defects, this study aims to provide a new secure PAKE based on extended chaotic maps with more security functionalities for TMISs. Additionally, we show that the proposed scheme for TMISs provides high security along with low communication cost, computational cost, and a variety of security features.


2015 ◽  
Vol 740 ◽  
pp. 885-888 ◽  
Author(s):  
Chun Xia Du ◽  
Feng Tong Wen ◽  
Hao Lin

In a recent paper, Chang et al. proposed an authentication scheme for E-coupon systems and proved that their scheme can prevent a range of attacks. In this paper, we reanalyze the Chang et al.’ scheme and demonstrate that it cannot resist off-line password attack, masquerading shop attack and masquerading customer attack. Moreover, it cannot achieve two security properties that is anonymity and traceability. Meanwhile, Lee proposed an efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. In the scheme, we find it also cannot resist off-line password attack, masquerading attack. Unfortunately, it resists an deadly error. So the scheme cannot run.


2016 ◽  
Vol 41 (1) ◽  
Author(s):  
Muhammad Umair Aslam ◽  
Abdelouahid Derhab ◽  
Kashif Saleem ◽  
Haider Abbas ◽  
Mehmet Orgun ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document