메뉴 건너뛰기




Volumn 40, Issue 11, 2016, Pages

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography

Author keywords

Authentication; Biometrics; Impersonation attack; Multiserver; ProVerif; Smart card stolen; Stolen verifier

Indexed keywords

BIOMETRY; DOCTOR PATIENT RELATION; HUMAN; INFORMATION SYSTEM; MEDICINE; SMART CARD; COMPUTER SECURITY; CONFIDENTIALITY; DEVICES; MEDICAL INFORMATION SYSTEM; TELEMEDICINE;

EID: 84988420360     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-016-0592-4     Document Type: Article
Times cited : (42)

References (33)
  • 1
    • 84956941011 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a secure password authentication mechanism for seamless handover in proxy mobile ipv6 networks
    • PID: 26580963
    • Alizadeh, M., Zamani, M., Baharun, S., Manaf, A. A., Sakurai, K., Anada, H., Keshavarz, H., Chaudhry, S. A., Khan, M. K., Cryptanalysis and improvement of a secure password authentication mechanism for seamless handover in proxy mobile ipv6 networks. PloS one 10(11):e0142716, 2015.
    • (2015) PloS one , vol.10 , Issue.11
    • Alizadeh, M.1    Zamani, M.2    Baharun, S.3    Manaf, A.A.4    Sakurai, K.5    Anada, H.6    Keshavarz, H.7    Chaudhry, S.A.8    Khan, M.K.9
  • 2
    • 84988361005 scopus 로고    scopus 로고
    • Mir, O., and Nikooghadam, M.: A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services
    • Mir, O., and Nikooghadam, M.: A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services
  • 3
    • 84922001116 scopus 로고    scopus 로고
    • Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
    • He, D., Kumar, N., Chen, J., Lee, C.-C., Chilamkurti, N., Yeo, S.-S., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 21(1): 49–60, 2013.
    • (2013) Multimed. Syst. , vol.21 , Issue.1 , pp. 49-60
    • He, D.1    Kumar, N.2    Chen, J.3    Lee, C.-C.4    Chilamkurti, N.5    Yeo, S.-S.6
  • 5
    • 84906774949 scopus 로고    scopus 로고
    • On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions
    • Wang, D., and Wang, P., On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73:41–57, 2014.
    • (2014) Comput. Netw. , vol.73 , pp. 41-57
    • Wang, D.1    Wang, P.2
  • 6
    • 84975275069 scopus 로고    scopus 로고
    • Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
    • COI: 1:CAS:528:DC%2BC2cXlvV2n
    • Wang, D., He, D., Wang, P., Chu, C., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Depend Secur Comput 99:1–1, 2014. doi:10.1109/TDSC.2014.2355850.
    • (2014) IEEE Trans Depend Secur Comput , vol.99 , pp. 1
    • Wang, D.1    He, D.2    Wang, P.3    Chu, C.4
  • 7
    • 84964246143 scopus 로고    scopus 로고
    • Anonymous authentication for wireless body area networks with provable security
    • He, D., Zeadally, S., Kumar, N., Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst J 99:1–12, 2016. doi:10.1109/JSYST.2016.2544805.
    • (2016) IEEE Syst J , vol.99 , pp. 1-12
    • He, D.1    Zeadally, S.2    Kumar, N.3    Lee, J.H.4
  • 8
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multiserver environment
    • He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823, 2015. doi:10.1109/JSYST.2014.2301517.
    • (2015) IEEE Syst J , vol.9 , Issue.3 , pp. 816-823
    • He, D.1    Wang, D.2
  • 9
    • 84988344651 scopus 로고    scopus 로고
    • A certificateless multiple-key agreement protocol based on bilinear pairings
    • Farash, M. S., Ahmadian-Attari, M., Bayat, M., A certificateless multiple-key agreement protocol based on bilinear pairings. IACR Crypt ePrint Arch 2012:393, 2012.
    • (2012) IACR Crypt ePrint Arch , vol.2012 , pp. 393
    • Farash, M.S.1    Ahmadian-Attari, M.2    Bayat, M.3
  • 10
    • 84876280558 scopus 로고    scopus 로고
    • A new efficient authenticated multiple-key exchange protocol from bilinear pairings
    • Farash, M. S., Attari, M. A., Atani, R. E., Jami, M., A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput Elect Eng 39(2):530–541, 2013.
    • (2013) Comput Elect Eng , vol.39 , Issue.2 , pp. 530-541
    • Farash, M.S.1    Attari, M.A.2    Atani, R.E.3    Jami, M.4
  • 11
    • 84943159629 scopus 로고    scopus 로고
    • An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve cryptography
    • Amin, R., Islam, S. H., Biswas, G., Khan, M. K., Kumar, N., An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve cryptography. J Med Syst 39 (11):1–18, 2015.
    • (2015) J Med Syst , vol.39 , Issue.11 , pp. 1-18
    • Amin, R.1    Islam, S.H.2    Biswas, G.3    Khan, M.K.4    Kumar, N.5
  • 12
    • 84921899111 scopus 로고    scopus 로고
    • Alizadeh, M., Baharun, S., Zamani, M., Khodadadi, T., Darvishi, M., Gholizadeh, S., Ahmadi, H., Anonymity and untraceability assessment of authentication protocols in proxy mobile ipv6. Jurnal Teknologi 72(5).
    • Alizadeh, M., Baharun, S., Zamani, M., Khodadadi, T., Darvishi, M., Gholizadeh, S., Ahmadi, H., Anonymity and untraceability assessment of authentication protocols in proxy mobile ipv6. Jurnal Teknologi 72(5).
  • 13
    • 84988410588 scopus 로고    scopus 로고
    • He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci.
    • He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci.
  • 14
    • 85008375269 scopus 로고    scopus 로고
    • An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc
    • Arshad, H., and Nikooghadam, M., An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl.,1–17, 2014.
    • (2014) Multimed Tools Appl. , pp. 1-17
    • Arshad, H.1    Nikooghadam, M.2
  • 15
    • 85008468625 scopus 로고    scopus 로고
    • One-to-many authentication for access control in mobile pay-tv systems
    • He, D., Kumar, N., Shen, H., Lee, J.-H., One-to-many authentication for access control in mobile pay-tv systems. Sci. Chin. Inf. Sci.,1–14, 2015.
    • (2015) Sci. Chin. Inf. Sci. , pp. 1-14
    • He, D.1    Kumar, N.2    Shen, H.3    Lee, J.-H.4
  • 16
    • 85043268105 scopus 로고    scopus 로고
    • Certificateless public auditing scheme for cloud-assisted wireless body area networks
    • He, D., Zeadally, S., Wu, L., Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 99:1–10, 2015. doi:10.1109/JSYST.2015.2428620.
    • (2015) IEEE Syst. J. , vol.99 , pp. 1-10
    • He, D.1    Zeadally, S.2    Wu, L.3
  • 17
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: two factor authentication featuring fingerprint data and tokenised random number
    • Jin, A. T. B., Ling, D. N. C., Goh, A., Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog. 37(11):2245–2255, 2004.
    • (2004) Pattern Recog. , vol.37 , Issue.11 , pp. 2245-2255
    • Jin, A.T.B.1    Ling, D.N.C.2    Goh, A.3
  • 18
    • 33750533142 scopus 로고    scopus 로고
    • An improved biohashing for human authentication
    • Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recog. 40(3): 1057–1065, 2007.
    • (2007) Pattern Recog. , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 19
    • 84904066086 scopus 로고    scopus 로고
    • A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion
    • Leng, L., Teoh, A. B. J., Li, M., Khan, M. K., A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur. Commun. Netw. 7(11):1860–1871, 2014.
    • (2014) Secur. Commun. Netw. , vol.7 , Issue.11 , pp. 1860-1871
    • Leng, L.1    Teoh, A.B.J.2    Li, M.3    Khan, M.K.4
  • 20
    • 84925674999 scopus 로고    scopus 로고
    • Alignment-free row-co-occurrence cancelable palmprint fuzzy vault
    • Leng, L., and Teoh, A. B. J., Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recog. 48(7):2290–2303, 2015.
    • (2015) Pattern Recog. , vol.48 , Issue.7 , pp. 2290-2303
    • Leng, L.1    Teoh, A.B.J.2
  • 21
    • 51849131973 scopus 로고    scopus 로고
    • Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.: On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Wagner, D. (Ed.) Advances in Cryptology, CRYPTO 2008, Vol. 5157 of Lecture Notes in Computer Science, pp. 203–220. Springer, Berlin (2008),
    • Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.: On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Wagner, D. (Ed.) Advances in Cryptology, CRYPTO 2008, Vol. 5157 of Lecture Notes in Computer Science, pp. 203–220. Springer, Berlin (2008), 10.1007/978-3-540-85174-5_12
  • 22
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev, D., and Yao, A. C., On the security of public key protocols. IEEE Trans. Inform. Theory 29(2): 198–208, 1983. doi:10.1109/TIT.1983.1056650.
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 23
    • 33747592366 scopus 로고    scopus 로고
    • Breaking a remote user authentication scheme for multi-server architecture
    • Cao, X., and Zhong, S., Breaking a remote user authentication scheme for multi-server architecture. IEEE Commun. Lett. 10(8):580–581, 2006. doi:10.1109/LCOMM.2006.1665116.
    • (2006) IEEE Commun. Lett. , vol.10 , Issue.8 , pp. 580-581
    • Cao, X.1    Zhong, S.2
  • 24
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges, T. S., Dabbish, E. A., Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 26
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • Xie, Q., A new authenticated key agreement for session initiation protocol. Int. J. Commun. Syst. 25(1):47–54, 2012.
    • (2012) Int. J. Commun. Syst. , vol.25 , Issue.1 , pp. 47-54
    • Xie, Q.1
  • 27
    • 84904544082 scopus 로고    scopus 로고
    • Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems
    • PID: 25047235
    • Xie, Q., Hu, B., Dong, N., Wong, D. S., Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems. PloS one 9(7):e102747, 2014.
    • (2014) PloS one , vol.9 , Issue.7
    • Xie, Q.1    Hu, B.2    Dong, N.3    Wong, D.S.4
  • 28
    • 85041316505 scopus 로고    scopus 로고
    • Peer-to-Peer Netw
    • Wu, F., Xu, L., Kumari, S., Li, X., An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl.,1–20, 2016.
    • (2016) Appl. , pp. 1-20
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 29
    • 84933564535 scopus 로고    scopus 로고
    • K., An enhanced privacy preserving remote user authentication scheme with provable security
    • Chaudhry, S. A., Farash, M. S., Naqvi, H., Kumari, S., Khan, M. K., An enhanced privacy preserving remote user authentication scheme with provable security. Secur. Commun. Netw., 1–13, 2015. doi:10.1002/sec.1299.
    • (2015) Secur. Commun. Netw. , pp. 1-13
    • Chaudhry, S.A.1    Farash, M.S.2    Naqvi, H.3    Kumari, S.4    Khan, M.5
  • 30
    • 84906835486 scopus 로고    scopus 로고
    • Advanced remote user authentication protocol for multi-server architecture based on ecc
    • Kalra, S., and Sood, S., Advanced remote user authentication protocol for multi-server architecture based on ecc. J. Inf. Secur. Appl. 18(2):98–107, 2013.
    • (2013) J. Inf. Secur. Appl. , vol.18 , Issue.2 , pp. 98-107
    • Kalra, S.1    Sood, S.2
  • 32
    • 84872320813 scopus 로고    scopus 로고
    • Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
    • Yoon, E.-J., and Yoo, K.-Y., Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J. Supercomput. 63(1):235–255, 2013.
    • (2013) J. Supercomput. , vol.63 , Issue.1 , pp. 235-255
    • Yoon, E.-J.1    Yoo, K.-Y.2
  • 33
    • 84901189762 scopus 로고    scopus 로고
    • A survey of sip authentication and key agreement schemes
    • Kilinc, H. H., and Yanik, T., A survey of sip authentication and key agreement schemes. IEEE Commun. Surveys Tutor. 16(2):1005–1023, 2014.
    • (2014) IEEE Commun. Surveys Tutor. , vol.16 , Issue.2 , pp. 1005-1023
    • Kilinc, H.H.1    Yanik, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.