• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于混沌映射的 TMIS 认证协议的构建。

Construction of a Chaotic Map-Based Authentication Protocol for TMIS.

机构信息

Department of Mathematics, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Chennai, India.

Department of Mathematics, The LNM Institute of Information Technology, Jaipur, India.

出版信息

J Med Syst. 2021 Jul 2;45(8):77. doi: 10.1007/s10916-021-01750-7.

DOI:10.1007/s10916-021-01750-7
PMID:34213620
Abstract

Upgraded network technology presents an advanced technological platform for telecare medicine information systems (TMIS) for patients. However, TMIS generally suffers various attacks since the information being shared through the insecure channel. Recently, many authentication techniques have been proposed relying on the chaotic map. However, many of these designs are not secure against the known attacks. In spite of the fact that some of the constructions attain low computation overhead, they cannot establish an anonymous communication and many of them fail to ensure forward secrecy. In this work, our aim is to present authentication and key agreement protocol for TMIS utilizing a chaotic map to achieve both security and efficiency. The underlying security assumptions are chaotic theory assumptions. This scheme supports forward secrecy and a secure session is established with just two messages of exchange. Moreover, we present a comparative analysis of related authentication techniques.

摘要

升级后的网络技术为远程医疗信息系统(TMIS)患者提供了先进的技术平台。然而,由于信息是通过不安全的通道共享的,TMIS 通常会受到各种攻击。最近,许多认证技术已经被提出,依赖于混沌图。然而,其中许多设计并不能抵御已知的攻击。尽管一些构造达到了低计算开销,但它们不能建立匿名通信,而且其中许多构造不能确保前向保密性。在这项工作中,我们的目的是利用混沌图为 TMIS 提出认证和密钥协商协议,以实现安全性和效率。基本的安全假设是混沌理论假设。该方案支持前向保密性,只需两次消息交换即可建立安全会话。此外,我们还对相关认证技术进行了比较分析。

相似文献

1
Construction of a Chaotic Map-Based Authentication Protocol for TMIS.基于混沌映射的 TMIS 认证协议的构建。
J Med Syst. 2021 Jul 2;45(8):77. doi: 10.1007/s10916-021-01750-7.
2
A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC.基于椭圆曲线密码的 TMIS 多服务器安全生物认证密钥交换协议
Comput Methods Programs Biomed. 2018 Oct;164:101-109. doi: 10.1016/j.cmpb.2018.07.008. Epub 2018 Jul 18.
3
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.用于远程医疗信息系统的基于密码的安全匿名用户认证和会话密钥协商方案。
Comput Methods Programs Biomed. 2016 Oct;135:167-85. doi: 10.1016/j.cmpb.2016.07.028. Epub 2016 Jul 29.
4
Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.理解远程医疗信息系统中两种认证与密钥协商方案的安全漏洞。
J Med Syst. 2015 Mar;39(3):19. doi: 10.1007/s10916-015-0193-7. Epub 2015 Feb 5.
5
Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.云辅助的远程医疗信息系统中的相互认证和隐私保护协议。
Comput Methods Programs Biomed. 2018 Apr;157:191-203. doi: 10.1016/j.cmpb.2018.02.002.
6
A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services.一种用于医疗远程医疗服务的基于共形切比雪夫混沌映射的认证协议构建。
Complex Intell Systems. 2021;7(5):2531-2542. doi: 10.1007/s40747-021-00441-7. Epub 2021 Jun 19.
7
Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.基于混沌映射的三因素认证密钥协商方案的远程医疗信息系统隐私保护
IEEE J Biomed Health Inform. 2017 Mar;21(2):465-475. doi: 10.1109/JBHI.2016.2517146. Epub 2016 Jan 12.
8
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.一种具有用户匿名性的 TMIS 的安全三方用户认证和密钥协商协议。
J Med Syst. 2015 Aug;39(8):78. doi: 10.1007/s10916-015-0258-7. Epub 2015 Jun 26.
9
A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications.基于 ECC 的强健高效的医疗应用互认证和会话密钥生成方案。
J Med Syst. 2018 Dec 1;43(1):10. doi: 10.1007/s10916-018-1120-5.
10
A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.一种用于远程医疗信息系统的安全的、保护用户匿名性的三因素远程用户认证方案。
J Med Syst. 2015 Mar;39(3):30. doi: 10.1007/s10916-015-0218-2. Epub 2015 Feb 13.