Learn More
Telecare medical information system (TMIS) constructs an efficient and convenient connection between patients and the medical server. The patients can enjoy medical services through public networks, and hence the protection of patients’ privacy is very significant. Very recently, Wu et al. identified Jiang et al.’s authentication scheme had some security(More)
Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients’ privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical(More)
In 2012, Chuang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. In this paper, however, we analyze Chuang et al.’s scheme and show that their scheme is in fact insecure to against server masquerading attack, off-line dictionary attack and user impersonation attack. Moreover, their(More)
Telecare medical information systems (TMIS), with the explosive growth of communication technology and physiological monitoring devices, are applied increasingly to enable and support healthcare delivery services. In order to safeguard patients’ privacy and tackle the illegal access, authentication schemes for TMIS have been investigated and designed by(More)
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme based on smart card which is believed to have many abilities to resist a range of network attacks. In this paper, we analyze the security of Lee’s scheme and show that the scheme is in fact insecure against insider-assisted attack, even if the adversary doesn’t(More)
In this paper, we present a new public key broadcast encryption (BE) for achieving adaptive security against arbitrary number of colluders. Specifically, our scheme is built from composite order multilinear maps and enjoys ciphertext overhead of a constant number of group elements which are O(1) bits. Furthermore, the private key size and public key size(More)
In 2013, Chang et al. proposed an untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. In this paper, we analyze Chang et al.s scheme and show that their scheme suffers from off-line password guessing attack, server spoofing attack and impersonation attack. Moreover, their scheme is traceable since the(More)
  • 1