期刊论文详细信息
IEEE Access
An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS
Jitendra V. Tembhurne1  Vishesh P. Gaikwad1  Chun-Ta Li2  Cheng-Chi Lee3  Chandrashekhar Meshram4 
[1] Department of Computer Science and Engineering, Indian Institute of Information Technology at Nagpur, Nagpur, India;Department of Information Management, Tainan University of Technology, Tainan, Taiwan;Department of Library and Information Science, Research and Development Center for Physical Education, Health, and Information Technology, Fu Jen Catholic University, New Taipei City, Taiwan;Department of Post Graduate Studies and Research in Mathematics, Jayawanti Haksar Government Post-Graduation College, College of Chhindwara University, Betul, Madhya Pradesh, India;
关键词: TMIS;    partial discrete logarithm;    data exchange;    authentication;    entropy smoothing hash function;   
DOI  :  10.1109/ACCESS.2021.3101111
来源: DOAJ
【 摘 要 】

In healthcare services, telecare medicine information systems (TMIS) is the viable solution offered currently. Moreover, to provide best security to the TMIS, it attracted the various researchers to investigate the security challenges in TMIS. Subsequently, the security of TMIS is improving but the application becoming widespread hence needs robust security technique. An efficient verifier-based 3-party authentication technique in telecare medicine information systems for data exchange, which permits only two users/patients to store their verifier in the database of an authentication server, computed using own password. The authentication system will then validate the user’s verifier and help them safely and easily share electronic medical records. In this work, we present an efficient provably secure verifier-based 3-party authentication technique using partial discrete logarithm (PDL) for exchanging data in TMIS. The presented technique not utilizing any public keys of the server, and does not require additional messages and number for key confirmation rounds. The proposed technique has higher security compared to the related verifier-based methods, has lower computational costs and fewer communications, and is therefore ideal for TMIS.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次