Abstract
The telecare medicine information systems (TMIS) offer a networking channel across public networks to access remote medical services and enable health care professionals and medical staff to make the best clinical decisions and treatments quickly. The verified-based three-party authentication protocol in TMIS for data exchange, authorizations only two patients/users to accumulation their verifiers in the record of authentication server calculated exhausting own password. The authentication scheme will then verify the verifiers of the patients/users and allow them to exchange electronic medical records securely and easily. In this paper, we provide an effective, provably secure, verified-based three-party authentication protocol for data exchange in TMIS utilising fractional chaotic maps. The authentication protocol provided does not use any public server keys and does not require the number of additional messages and rounds for key validation. The projected protocol is appropriate for TMIS because it has stronger security and cheaper communication costs than the corresponding verified-based approach. The development of smart cities can be accelerated with the proposed protocol.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Not available.
References
Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: International workshop on public key cryptography. Springer, Berlin.
Abdalla M, Pointcheval D (2005) Simple password-based authenticated key protocols. Top Cryptol—CT-RSA 2005 Lect Notes Comput Sci 3376:191–208
Alawida M, Samsudin A, Alajarmeh N, Teh JS, Ahmad M (2021) A novel hash function based on a chaotic sponge and DNA sequence. IEEE Access 9:17882–17897
Ali Z, Hussain S, Rehman RHU, Munshi A, Liaqat M, Kumar N, Chaudhry SA (2020) ITSSAKA-MS: an improved three-factor symmetric-key based secure AKA scheme for multi-server environments. IEEE Access 8:107993–108003
Arshad H, Nikooghadam M (2014) Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J Med Syst 38(12):136
Barman S, Shum HPH, Chattopadhyay S, Samanta D (2019) A secure authentication protocol for multi-server-based e-healthcare using a Fuzzy commitment scheme. IEEE Access 7:12557–12574
Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 139–155
Bergamo P, Arco P, Santis A, Kocarev L (2005) Security of public key cryptosystems based on Chebyshev polynomials. IEEE Trans Circ Syst I 52:1382–1393
Chang TY, Hwang MS, Yang WP (2011) A communication-efficient three-party password authenticated key exchange protocol. Inf Sci 181(1):217–226
Chaudhry SA, Naqvi H, Farash MS, Shon T, Sher M (2018) An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J Supercomput 74(8):3504–3520
Chaudhry SA, Naqvi H, Khan MK (2018) An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multimed Tools Appl 77(5):5503–5524
Chen CM, Xu L, Fang W, Wu TY (2017) A three-party password authenticated key exchange protocol resistant to stolen smart card attacks. Advances in intelligent information hiding and multimedia signal processing. Springer, Cham, pp 331–336
Chiou SY, Lin CH (2018) An efficient three-party authentication scheme for data exchange in medical environment. Sec Commun Netw. https://doi.org/10.1155/2018/9146297
Debiao H, Jianhua C, Rui Z (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1989–1995
Deebak BD, Muthaiah R, Thenmozhi K, Swaminathan PI (2016) Analyzing three-party authentication and key agreement protocol for real time IP multimedia server–client systems. Multimed Tools Appl 75(10):5795–5817
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Farash MS, Attari MA (2014) An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn 77(1–2):399–411
Gennaro R, Shoup V (2004) A note on an encryption scheme of Kurosawa and Desmedt. IACR Cryptol ePrint Arch 2004:194
Guo XY, Sun DZ, Yang Y (2020) An improved three-factor session initiation protocol using Chebyshev chaotic map. IEEE Access 8:111265–111277
Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Choas Soliton Fract 39(3):1283–1289
Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst. https://doi.org/10.1007/s10916-012-9919-y
Hasheminezhad A, Hadadi F, Shirmohammadi H (2021) Investigation and prioritization of risk factors in the collision of two passenger trains based on fuzzy COPRAS and fuzzy DEMATEL methods. Soft Comput 25:4677–4697
He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30–37
Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Progr Biomed 135:37–50
Jabbari A, Mohasefi JB (2019) Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 95(4):3177–3191
Jabbari A, Mohasefi JB (2021) User-sensor mutual authenticated key establishment scheme for critical applications in wireless sensor networks. Wireless Netw 27(1):227–248
Kwon JO, Jeong IR, Sakurai K, Lee DH (2007) Efficient verifier-based password-authenticated key exchange in the three-party setting. Comput Stand Interfaces 29(5):513–520
Lambrinoudakis C, Gritzalis S (2000) Managing medical and insurance information through a smart-card-based information system. J Med Syst 24(4):213–234
Lee TF (2013) An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med Syst. https://doi.org/10.1007/s10916-013-9985-9
Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. https://doi.org/10.1007/s11071-012-0652-3
Lee TF, Hwang T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inf Sci 180(9):1702–1714
Lee TF, Liu CM (2013) A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J Med Syst 37(3):9933
Lee SW, Kim HS, Yoo KY (2005) Efficient verifier-based key agreement protocol for three parties without server’s public key. Appl Math Comput 167(2):996–1003
Lee TF, Liu JL, Sung MJ, Yang SB, Chen CM (2009) Communication-efficient three-party protocols for authentication and key agreement. Comput Math Appl 58(4):641–648
Li CT, Weng CY, Lee CC (2015) A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. J Med Syst. https://doi.org/10.1007/s10916-015-0260-0
Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst. https://doi.org/10.1007/s10916-016-0586-2
Meshram C, Obaidat MS, Meshram SG (2018) Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography. Sec Privacy 1(1):1–9
Meshram C, Lee CC, Meshram SG, Li CT (2019a) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937–6946
Meshram C, Lee CC, Meshram SG, Khan MK (2019b) An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput 23(24):13127–13138
Meshram C, Lee CC, Ranadive AS, Li CT, Meshram SG, Tembhurne JV (2020a) A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int J Commun Syst 33(7):e4307
Meshram C, Lee CC, Meshram SG, Meshram A (2020b) OOS-SSS: An efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network. IEEE Access 8(1):80063–80073
Meshram C, Ibrahim RW, Obaid AJ, Meshram SG, Meshram A, Abd El-Latif AM (2021a) Fractional chaotic maps based short signature scheme under human-centred IoT environments. J Adv Res 32:139–148
Meshram C, Alsanad A, Tembhurne JV, Shende SW, Kalare KW, Meshram SG, Akbar MA, Gumaei A (2021b) A provably secure lightweight subtree-based short signature scheme with fuzzy user data sharing for human-centered IoT. IEEE Access 9:3649–3659
Mir O, van der Weide T, Lee CC (2015) A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems. J Med Syst 39(9):89
Niu Y, Wang X (2011) An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 16:1986–1992
Sadeghi J, Essmayil Kaboli M (2015) Investigation of the influences of track superstructure parameters on ballasted railway track design. Civil Eng Infrastruct J 48(1):157–174
Salem FM, Amin R (2020) A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Inf Sci 527:382–393
Shoup V (2004) Sequences of games: a tool for taming complexity in security proofs. IACR Cryptology ePrint Archive. http://eprint.iacr.org/2004/332
Sureshkumar V, Amin R, Obaidat MS, Karthikeyan I (2020) An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map. J Inf Sec Appl 53:102539
Tseng H, Jan R, Yang W (2009) A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International conference on communications (ICC’09):1–6.
Tso R (2013) Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol. J Supercomput 66(2):863–874
Wang RC, Mo KR (2006) Security enhancement on efficient verifier-based key agreement protocol for three parties without server’s public key. Int Math Forum 1(20):965–972
Wang Q, Ruan O, Wang Z (2017) Security analysis and improvements of three-party password-based authenticated key exchange protocol. International conference on emerging internetworking, data and web technologies. Springer, Cham, pp 497–508
Wei J, Hu X, Liu W (2012) An improved authentication scheme for telecare medicine information systems. J Med Syst 36(6):3597–3604
Wen F, Guo D (2014) An improved anonymous authentication scheme for telecare medical information systems. J Med Syst. https://doi.org/10.1007/s10916-014-0026-0
Wen HA, Lee TF, Hwang T (2005) Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEEE Proc-Commun 152(2):138–143
Wu ZY, Lee YC, Lai F, Lee HC, Chung Y (2012) A secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1529–1535
Yang XJ, Baleanu D, Srivastava HM (2015) Local fractional integral transforms and their applications. Academic Press, Cambridge
Yau WC, Phan RCW (2013) Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst. https://doi.org/10.1007/s10916-013-9993-9
Yeh HT, Sun HM, Hwang T (2003) Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. J Inf Sci Eng 19(6):1059–1070
Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit Fract 37(3):669–674
Zhang Q, Chaudhary P, Kumari S, Kong Z, Liu W (2019) Verifier-based anonymous password-authenticated key exchange protocol in the standard model. Math Biosci Eng 16(5):3623–3640
Zhu Z (2012) An efficient authentication scheme for telecare medicine information systems. J Med Syst 36(6):3833–3838
Acknowledgements
The authors would like to thank anonymous reviewers of soft computing for their careful and helpful comments. This work was supported by the Science and Engineering Research Board (SERB), a statutory body of Department of Science and Technology (DST), Govt. of India, under the Project grant (File No.: EEQ/2021/000278).
Funding
This work was funded by the Science and Engineering Research Board (SERB), a statutory body of Department of Science and Technology (DST), Govt. of India, under the Project grant (File No.: EEQ/2021/000278).
Author information
Authors and Affiliations
Contributions
Conceptualization: PY; CM; RWI; Formal analysis: SKB; MAA; Investigation: PY; CM; RWI; Methodology: CM; PY; RWI; Resources: CM; Software: MAA; Supervision: CM; PY; RWI; Validation/Visualization: CM; PY; RWI; Writing—original draft: CM; PY; RWI; Writing—review and editing: PY; CM; RWI; MAA.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Not available.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yupapin, P., Meshram, C., Barve, S.K. et al. An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems. Soft Comput 27, 6033–6047 (2023). https://doi.org/10.1007/s00500-023-07889-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-023-07889-4