Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2015 May;39(5):49.
doi: 10.1007/s10916-015-0233-3. Epub 2015 Mar 3.

Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems

Affiliations

Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems

Liping Zhang et al. J Med Syst. 2015 May.

Abstract

To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.

PubMed Disclaimer

References

    1. J Med Syst. 2015 Jan;39(1):153 - PubMed
    1. J Med Syst. 2014 Oct;38(10):135 - PubMed
    1. J Med Syst. 2014 May;38(5):26 - PubMed
    1. J Med Syst. 2015 Feb;39(2):10 - PubMed
    1. J Med Syst. 2012 Dec;36(6):3833-8 - PubMed

Publication types

MeSH terms

LinkOut - more resources