A secure three-factor-based authentication with key agreement protocol for e-Health clouds

@article{Chen2020AST,
  title={A secure three-factor-based authentication with key agreement protocol for e-Health clouds},
  author={Yulei Chen and Jianhua Chen},
  journal={The Journal of Supercomputing},
  year={2020},
  pages={1 - 22}
}
The rapid development of electronic healthcare (e-Health) has brought great convenience to people’s life. In order to guarantee the security of users, a large number of identity authentication protocols have been put forward. Recently, Jiang et al. proposed a privacy preserving three-factor authentication protocol for e-Health clouds. However, we find that their protocol cannot resist the replay attack, the denial of service attack and the known session-specific temporary information attack… Expand
2 Citations

Figures and Tables from this paper

An Efficient and Provable Multifactor Mutual Authentication Protocol for Multigateway Wireless Sensor Networks
  • Shuailiang Zhang, Xiujuan Du, Xin Liu
  • Computer Science
  • Secur. Commun. Networks
  • 2021
TLDR
A novel multifactor authentication protocol for multigateway wireless sensor networks is designed, which only applies the lightweight hash function and is given biometric information to achieve a higher level of security and efficiency and a larger communication coverage area. Expand
A model of digital identity for better information security in e-learning systems
TLDR
A model of digital identity intended primarily for e-learning systems to contribute to raising of information security awareness and improving information security behavior and to enable the bridging of security gaps in the interaction between student/administrator is developed. Expand

References

SHOWING 1-10 OF 60 REFERENCES
A privacy preserving three-factor authentication protocol for e-Health clouds
TLDR
A robust three-factor authentication protocol is put forward, which not only guards various known attacks, but also provides more desired security properties, and it is demonstrated that the scheme provides mutual authentication using the Burrows–Abadi–Needham logic. Expand
An Improved Password-Based Remote User Authentication Protocol without Smart Cards
TLDR
This work proposes an improved authentication protocol without using smart cards that not only provides more security guarantees, but also is more efficient both in computation and communication cost. Expand
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks
TLDR
A new three-factor remote authentication scheme based on ECC is presented and it is proved secure with a formal proof and analysis and is more practical for application due to the security and efficiency. Expand
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
TLDR
This paper first analyzes He-Wang's scheme, then proposes a new secure multi-server authentication protocol using biometric-based smart card and ECC with more security functionalities and shows that the proposed scheme provides secure authentication. Expand
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
TLDR
It is shown that user privacy of Kim-Kim's scheme is achieved at the price of severe usability downgrade - a de-synchronization attack on user's pseudonym identities may render the scheme completely unusable unless the user re-registers. Expand
Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol
TLDR
Security and performance analyses show that the proposed two-factor authentication and key agreement scheme for SIP not only enhances the security, but also improves the efficiency. Expand
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks
TLDR
This work proposes a novel anonymous authentication scheme for roaming service in global mobility networks that contains the authentication and establishment of session key scheme when mobile user is located in his/her home network, therefore it is more practical and universal for global Mobility networks. Expand
Efficient multi-server authentication scheme based on one-way hash function without verification table
TLDR
This study proposes an alternative multi-server authentication scheme using smart cards that is based on the nonce, uses one-way hash function, and does not need to store any verification table in the server and registration center. Expand
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
TLDR
This work finds that the proposed secure password-based remote user authentication scheme without smart cards is vulnerable to the device stolen attack and the privileged insider attack and proposes an improved scheme to overcome weaknesses and maintain the benefits of the original scheme. Expand
Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics
  • C. Fan, Yi-Hui Lin
  • Computer Science
  • IEEE Transactions on Information Forensics and Security
  • 2009
TLDR
The proposed scheme fully preserves the privacy of the biometric data of every user, that is, the scheme does not reveal theBiometric data to anyone else, including the remote servers, through the GNY (Gong, Needham, and Yahalom) logic. Expand
...
1
2
3
4
5
...