메뉴 건너뛰기




Volumn 8, Issue 2, 2015, Pages 149-158

Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system

Author keywords

Authentication; Impersonation attack; Medical server; Telecare medicine information system; User anonymity

Indexed keywords

DENIAL-OF-SERVICE ATTACK; INFORMATION USE; MEDICAL COMPUTING; MEDICAL INFORMATION SYSTEMS; SMART CARDS;

EID: 84919343487     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.967     Document Type: Article
Times cited : (36)

References (33)
  • 1
    • 0033790614 scopus 로고    scopus 로고
    • Managing medical and insurance information through a smart-card-based information system
    • Lambrinoudakis C, Gritzalis S. Managing medical and insurance information through a smart-card-based information system. Journal of Medical Systems 2000; 24(4):213-234.
    • (2000) Journal of Medical Systems , vol.24 , Issue.4 , pp. 213-234
    • Lambrinoudakis, C.1    Gritzalis, S.2
  • 3
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme
    • Khan MK, Kim SK, Alghathbar K. Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme. Computer Communications 2010; 34(3):305-309.
    • (2010) Computer Communications , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.K.1    Kim, S.K.2    Alghathbar, K.3
  • 4
    • 78649335192 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    • Li X, Niu J, Ma J, Wang W, Liu C. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2011; 34(1):73-79.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 73-79
    • Li, X.1    Niu, J.2    Ma, J.3    Wang, W.4    Liu, C.5
  • 5
    • 84861369956 scopus 로고    scopus 로고
    • Further improvement of Juang 's password-authenticated key agreement scheme using smart cards
    • He D, Chen J, Hu J. Further improvement of Juang et al.'s password-authenticated key agreement scheme using smart cards. Kuwait Journal of Science & Engineering 2011; 38(2A):55-68.
    • (2011) Kuwait Journal of Science & Engineering , vol.38 , Issue.2 A , pp. 55-68
    • He, D.1    Chen, J.2    Hu, J.3
  • 6
    • 84866625525 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of Chen 's remote user authentication scheme using smart card
    • Kumari S, Gupta MK, Kumar M. Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Central European Journal of Computer Science 2012; 2(1):60-75.
    • (2012) Central European Journal of Computer Science , vol.2 , Issue.1 , pp. 60-75
    • Kumari, S.1    Gupta, M.K.2    Kumar, M.3
  • 7
    • 84878978708 scopus 로고    scopus 로고
    • Improvement on a smart card based password authentication scheme
    • He D, Chen J, Hu J. Improvement on a smart card based password authentication scheme. Journal of Internet Technology 2012; 13(3):405-410.
    • (2012) Journal of Internet Technology , vol.13 , Issue.3 , pp. 405-410
    • He, D.1    Chen, J.2    Hu, J.3
  • 8
    • 84863989374 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
    • He D, Chen Y, Chen J. Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dynamics 2012; 69(3):1149-1157.
    • (2012) Nonlinear Dynamics , vol.69 , Issue.3 , pp. 1149-1157
    • He, D.1    Chen, Y.2    Chen, J.3
  • 9
    • 84878967179 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards
    • He D, Wang D, Wu S. Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards. Information Technology and Control 2013; 42(2):170-177.
    • (2013) Information Technology and Control , vol.42 , Issue.2 , pp. 170-177
    • He, D.1    Wang, D.2    Wu, S.3
  • 10
    • 84876554631 scopus 로고    scopus 로고
    • Applying LU decomposition of matrices to design anonymity bilateral remote user authentication scheme
    • Article ID 910409
    • Li X, Niu J, Khan MK, Wang Z. Applying LU decomposition of matrices to design anonymity bilateral remote user authentication scheme. Mathematical Problems in Engineering 2013; Article ID 910409, 10 pages: DOI:10.1155/2013/910409.
    • (2013) Mathematical Problems in Engineering , pp. 10
    • Li, X.1    Niu, J.2    Khan, M.K.3    Wang, Z.4
  • 11
  • 12
    • 84908157951 scopus 로고    scopus 로고
    • Applying biometrics to design three-factor remote user authentication scheme with key agreement
    • Li X, Niu J, Wang Z, Chen C. Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks 2013. doi:10.1002/Sec.767.
    • (2013) Security and Communication Networks
    • Li, X.1    Niu, J.2    Wang, Z.3    Chen, C.4
  • 13
    • 84923216123 scopus 로고    scopus 로고
    • Cryptanalysis of a dynamic identity based remote user authentication scheme with verifiable password update
    • Li X, Niu J, Liao J, Liang W. Cryptanalysis of a dynamic identity based remote user authentication scheme with verifiable password update. International Journal of Communication Systems 2013. doi:10.1002/dac.2676.
    • (2013) International Journal of Communication Systems
    • Li, X.1    Niu, J.2    Liao, J.3    Liang, W.4
  • 14
    • 84906780054 scopus 로고    scopus 로고
    • More efficient key-hash based fingerprint remote authentication scheme using mobile device
    • Khan MK, Kumari S, Gupta MK. More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 2013. doi:10.1007/s00607-013-0308-2.
    • (2013) Computing
    • Khan, M.K.1    Kumari, S.2    Gupta, M.K.3
  • 15
    • 84910619202 scopus 로고    scopus 로고
    • More secure smart card based remote user password authentication scheme with user anonymity
    • Kumari S, Khan MK. More secure smart card based remote user password authentication scheme with user anonymity. Security and Communication Networks 2013. doi:10.1002/Sec.916.
    • (2013) Security and Communication Networks
    • Kumari, S.1    Khan, M.K.2
  • 16
    • 84902246739 scopus 로고    scopus 로고
    • An improved timestamp-based password authentication scheme: comments, cryptanalysis and improvement
    • Kumari S, Gupta MK, Khan MK, Li X. An improved timestamp-based password authentication scheme: comments, cryptanalysis and improvement. Security and Communication Networks 2013. doi:10.1002/Sec.906.
    • (2013) Security and Communication Networks
    • Kumari, S.1    Gupta, M.K.2    Khan, M.K.3    Li, X.4
  • 17
    • 84914669082 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
    • Kumari S, Khan MK. Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'. International Journal of Communication Systems 2013. doi:10.1002/dac.2590.
    • (2013) International Journal of Communication Systems
    • Kumari, S.1    Khan, M.K.2
  • 18
    • 84878597719 scopus 로고    scopus 로고
    • A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment
    • Li X, Ma J, Wang W, Xiong Y, Zhang J. A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment. Mathematical and Computer Modelling 2013; 58(1-2):85-95.
    • (2013) Mathematical and Computer Modelling , vol.58 , Issue.1-2 , pp. 85-95
    • Li, X.1    Ma, J.2    Wang, W.3    Xiong, Y.4    Zhang, J.5
  • 19
    • 84856217617 scopus 로고    scopus 로고
    • An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
    • Li X, Xiong Y, Ma J, Wang W. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications 2012; 35(2):763-769.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.2 , pp. 763-769
    • Li, X.1    Xiong, Y.2    Ma, J.3    Wang, W.4
  • 20
    • 80051571433 scopus 로고    scopus 로고
    • An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
    • He D, Chen J, Hu J. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion 2012; 13(3):223-230.
    • (2012) Information Fusion , vol.13 , Issue.3 , pp. 223-230
    • He, D.1    Chen, J.2    Hu, J.3
  • 21
    • 84859767453 scopus 로고    scopus 로고
    • An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings
    • He D. An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings. Ad Hoc Networks 2012; 10(6):1009-1016.
    • (2012) Ad Hoc Networks , vol.10 , Issue.6 , pp. 1009-1016
    • He, D.1
  • 22
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • Yang CC, Wang RC, Liu WT. Secure authentication scheme for session initiation protocol. Computers & Security 2005; 24:381-386.
    • (2005) Computers & Security , vol.24 , pp. 381-386
    • Yang, C.C.1    Wang, R.C.2    Liu, W.T.3
  • 23
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    • He D, Chen J, Chen Y. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks 2012; 5(12): 1423-1429.
    • (2012) Security and Communication Networks , vol.5 , Issue.12 , pp. 1423-1429
    • He, D.1    Chen, J.2    Chen, Y.3
  • 25
    • 84864061174 scopus 로고    scopus 로고
    • A secure authentication scheme for telecare medicine information systems
    • Wu ZY, Lee YC, Lai F, Lee HC, Chung Y. A secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 2010. doi:10.1007/s10916-010-9614-9.
    • (2010) Journal of Medical Systems
    • Wu, Z.Y.1    Lee, Y.C.2    Lai, F.3    Lee, H.C.4    Chung, Y.5
  • 26
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for Telecare medicine information systems
    • He DB, Chen JH, Zhang R. A more secure authentication scheme for Telecare medicine information systems. Journal of Medical Systems 2011. doi:10.1007/s10916-011-9658-5.
    • (2011) Journal of Medical Systems
    • He, D.B.1    Chen, J.H.2    Zhang, R.3
  • 27
    • 84867869987 scopus 로고    scopus 로고
    • An improved authentication scheme for Telecare medicine information systems
    • Wei J, Hu X, Liu W. An improved authentication scheme for Telecare medicine information systems. Journal of Medical Systems 2012. doi:10.1007/s10916-012-9835-1.
    • (2012) Journal of Medical Systems
    • Wei, J.1    Hu, X.2    Liu, W.3
  • 28
    • 84867843422 scopus 로고    scopus 로고
    • An efficient authentication scheme for Telecare medicine information systems
    • Zhu Z. An efficient authentication scheme for Telecare medicine information systems. Journal of Medical Systems 2012. doi:10.1007/s10916-012-9856-9.
    • (2012) Journal of Medical Systems
    • Zhu, Z.1
  • 29
    • 84879569082 scopus 로고    scopus 로고
    • An authentication scheme for secure access to healthcare services
    • Khan MK, Kumari S. An authentication scheme for secure access to healthcare services. Journal of Medical Systems 2013. doi:10.1007/s10916-013-9954-3.
    • (2013) Journal of Medical Systems
    • Khan, M.K.1    Kumari, S.2
  • 30
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis. Proceedings of Advances in Cryptology, Santa Barbara, CA, U.S.A.
    • Kocher P, Jaffe J, Jun B. Differential power analysis. Proceedings of Advances in Cryptology, Santa Barbara, CA, U.S.A., 1999; 388-397.
    • (1999) , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 31
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 32
    • 84867867616 scopus 로고    scopus 로고
    • An efficient and secure dynamic id-based authentication scheme for Telecare medical information systems
    • Chen HM, Lo JW, Yeh CK. An efficient and secure dynamic id-based authentication scheme for Telecare medical information systems. Journal of Medical Systems 2012. doi:10.1007/s10916-012-9862-y.
    • (2012) Journal of Medical Systems
    • Chen, H.M.1    Lo, J.W.2    Yeh, C.K.3
  • 33
    • 84873039261 scopus 로고    scopus 로고
    • Strong authentication scheme for Telecare medicine information systems
    • Pu Q, Wang J, Zhao R. Strong authentication scheme for Telecare medicine information systems. Journal of Medical Systems 2011. doi:10.1007/s10916-011-9735-9.
    • (2011) Journal of Medical Systems
    • Pu, Q.1    Wang, J.2    Zhao, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.