Enhancing privacy with shared Pseudo random sequences
Proceedings of the 13th international conference on Security protocols
A chaotic maps-based key agreement protocol that preserves user anonymity
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Strong Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
An Improved Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Journal of Medical Systems
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
Journal of Medical Systems
Journal of Medical Systems
Journal of Medical Systems
Hi-index | 0.00 |
To ensure only authorized access to medical services, several authentication schemes for telecare medicine information systems (TMIS) have been proposed in the literature. Due to its better performance than traditional cryptography, Hao et al. proposed an authentication scheme for TMIS using chaotic map based cryptography. They claimed that their scheme could resist various attacks, including the smart card stolen attack. However, we identify that their scheme is vulnerable to the stolen smart card attack. The reason causing the stolen smart card attack is that the scheme is designed based on the assumption that the scheme itself achieves user untraceability. Then, we propose a robust authentication and key agreement scheme. Compared with the previous schemes, our scheme not only enjoys more security features, but also has better efficiency. Our analysis indicates that designing a two-factor authentication scheme based on the assumption that privacy protection is achieved in the scheme itself may pose potential security risks. The lesson learned is that, we should avoid this situation in the future design of two-factor authentication schemes.