Skip to main content

Advertisement

Log in

An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems

  • Foundation, algebraic, and analytical methods in soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The telecare medicine information systems (TMIS) offer a networking channel across public networks to access remote medical services and enable health care professionals and medical staff to make the best clinical decisions and treatments quickly. The verified-based three-party authentication protocol in TMIS for data exchange, authorizations only two patients/users to accumulation their verifiers in the record of authentication server calculated exhausting own password. The authentication scheme will then verify the verifiers of the patients/users and allow them to exchange electronic medical records securely and easily. In this paper, we provide an effective, provably secure, verified-based three-party authentication protocol for data exchange in TMIS utilising fractional chaotic maps. The authentication protocol provided does not use any public server keys and does not require the number of additional messages and rounds for key validation. The projected protocol is appropriate for TMIS because it has stronger security and cheaper communication costs than the corresponding verified-based approach. The development of smart cities can be accelerated with the proposed protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

Not available.

References

  • Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: International workshop on public key cryptography. Springer, Berlin.

  • Abdalla M, Pointcheval D (2005) Simple password-based authenticated key protocols. Top Cryptol—CT-RSA 2005 Lect Notes Comput Sci 3376:191–208

    MATH  Google Scholar 

  • Alawida M, Samsudin A, Alajarmeh N, Teh JS, Ahmad M (2021) A novel hash function based on a chaotic sponge and DNA sequence. IEEE Access 9:17882–17897

    Google Scholar 

  • Ali Z, Hussain S, Rehman RHU, Munshi A, Liaqat M, Kumar N, Chaudhry SA (2020) ITSSAKA-MS: an improved three-factor symmetric-key based secure AKA scheme for multi-server environments. IEEE Access 8:107993–108003

    Google Scholar 

  • Arshad H, Nikooghadam M (2014) Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J Med Syst 38(12):136

    Google Scholar 

  • Barman S, Shum HPH, Chattopadhyay S, Samanta D (2019) A secure authentication protocol for multi-server-based e-healthcare using a Fuzzy commitment scheme. IEEE Access 7:12557–12574

    Google Scholar 

  • Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 139–155

    Google Scholar 

  • Bergamo P, Arco P, Santis A, Kocarev L (2005) Security of public key cryptosystems based on Chebyshev polynomials. IEEE Trans Circ Syst I 52:1382–1393

    MathSciNet  MATH  Google Scholar 

  • Chang TY, Hwang MS, Yang WP (2011) A communication-efficient three-party password authenticated key exchange protocol. Inf Sci 181(1):217–226

    MathSciNet  Google Scholar 

  • Chaudhry SA, Naqvi H, Farash MS, Shon T, Sher M (2018) An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J Supercomput 74(8):3504–3520

    Google Scholar 

  • Chaudhry SA, Naqvi H, Khan MK (2018) An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multimed Tools Appl 77(5):5503–5524

    Google Scholar 

  • Chen CM, Xu L, Fang W, Wu TY (2017) A three-party password authenticated key exchange protocol resistant to stolen smart card attacks. Advances in intelligent information hiding and multimedia signal processing. Springer, Cham, pp 331–336

    Google Scholar 

  • Chiou SY, Lin CH (2018) An efficient three-party authentication scheme for data exchange in medical environment. Sec Commun Netw. https://doi.org/10.1155/2018/9146297

    Article  Google Scholar 

  • Debiao H, Jianhua C, Rui Z (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1989–1995

    Google Scholar 

  • Deebak BD, Muthaiah R, Thenmozhi K, Swaminathan PI (2016) Analyzing three-party authentication and key agreement protocol for real time IP multimedia server–client systems. Multimed Tools Appl 75(10):5795–5817

    Google Scholar 

  • Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    MathSciNet  MATH  Google Scholar 

  • Farash MS, Attari MA (2014) An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn 77(1–2):399–411

    MathSciNet  MATH  Google Scholar 

  • Gennaro R, Shoup V (2004) A note on an encryption scheme of Kurosawa and Desmedt. IACR Cryptol ePrint Arch 2004:194

    Google Scholar 

  • Guo XY, Sun DZ, Yang Y (2020) An improved three-factor session initiation protocol using Chebyshev chaotic map. IEEE Access 8:111265–111277

    Google Scholar 

  • Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Choas Soliton Fract 39(3):1283–1289

    MathSciNet  MATH  Google Scholar 

  • Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst. https://doi.org/10.1007/s10916-012-9919-y

    Article  Google Scholar 

  • Hasheminezhad A, Hadadi F, Shirmohammadi H (2021) Investigation and prioritization of risk factors in the collision of two passenger trains based on fuzzy COPRAS and fuzzy DEMATEL methods. Soft Comput 25:4677–4697

    Google Scholar 

  • He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30–37

    Google Scholar 

  • Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Progr Biomed 135:37–50

    Google Scholar 

  • Jabbari A, Mohasefi JB (2019) Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 95(4):3177–3191

    MATH  Google Scholar 

  • Jabbari A, Mohasefi JB (2021) User-sensor mutual authenticated key establishment scheme for critical applications in wireless sensor networks. Wireless Netw 27(1):227–248

    Google Scholar 

  • Kwon JO, Jeong IR, Sakurai K, Lee DH (2007) Efficient verifier-based password-authenticated key exchange in the three-party setting. Comput Stand Interfaces 29(5):513–520

    Google Scholar 

  • Lambrinoudakis C, Gritzalis S (2000) Managing medical and insurance information through a smart-card-based information system. J Med Syst 24(4):213–234

    Google Scholar 

  • Lee TF (2013) An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med Syst. https://doi.org/10.1007/s10916-013-9985-9

    Article  Google Scholar 

  • Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. https://doi.org/10.1007/s11071-012-0652-3

    Article  MathSciNet  Google Scholar 

  • Lee TF, Hwang T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inf Sci 180(9):1702–1714

    MATH  Google Scholar 

  • Lee TF, Liu CM (2013) A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J Med Syst 37(3):9933

    Google Scholar 

  • Lee SW, Kim HS, Yoo KY (2005) Efficient verifier-based key agreement protocol for three parties without server’s public key. Appl Math Comput 167(2):996–1003

    MathSciNet  MATH  Google Scholar 

  • Lee TF, Liu JL, Sung MJ, Yang SB, Chen CM (2009) Communication-efficient three-party protocols for authentication and key agreement. Comput Math Appl 58(4):641–648

    MathSciNet  MATH  Google Scholar 

  • Li CT, Weng CY, Lee CC (2015) A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. J Med Syst. https://doi.org/10.1007/s10916-015-0260-0

    Article  Google Scholar 

  • Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst. https://doi.org/10.1007/s10916-016-0586-2

    Article  Google Scholar 

  • Meshram C, Obaidat MS, Meshram SG (2018) Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography. Sec Privacy 1(1):1–9

    Google Scholar 

  • Meshram C, Lee CC, Meshram SG, Li CT (2019a) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937–6946

    MATH  Google Scholar 

  • Meshram C, Lee CC, Meshram SG, Khan MK (2019b) An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput 23(24):13127–13138

    MATH  Google Scholar 

  • Meshram C, Lee CC, Ranadive AS, Li CT, Meshram SG, Tembhurne JV (2020a) A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int J Commun Syst 33(7):e4307

    Google Scholar 

  • Meshram C, Lee CC, Meshram SG, Meshram A (2020b) OOS-SSS: An efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network. IEEE Access 8(1):80063–80073

    Google Scholar 

  • Meshram C, Ibrahim RW, Obaid AJ, Meshram SG, Meshram A, Abd El-Latif AM (2021a) Fractional chaotic maps based short signature scheme under human-centred IoT environments. J Adv Res 32:139–148

    Google Scholar 

  • Meshram C, Alsanad A, Tembhurne JV, Shende SW, Kalare KW, Meshram SG, Akbar MA, Gumaei A (2021b) A provably secure lightweight subtree-based short signature scheme with fuzzy user data sharing for human-centered IoT. IEEE Access 9:3649–3659

    Google Scholar 

  • Mir O, van der Weide T, Lee CC (2015) A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems. J Med Syst 39(9):89

    Google Scholar 

  • Niu Y, Wang X (2011) An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 16:1986–1992

    MathSciNet  MATH  Google Scholar 

  • Sadeghi J, Essmayil Kaboli M (2015) Investigation of the influences of track superstructure parameters on ballasted railway track design. Civil Eng Infrastruct J 48(1):157–174

    Google Scholar 

  • Salem FM, Amin R (2020) A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Inf Sci 527:382–393

    MathSciNet  MATH  Google Scholar 

  • Shoup V (2004) Sequences of games: a tool for taming complexity in security proofs. IACR Cryptology ePrint Archive. http://eprint.iacr.org/2004/332

  • Sureshkumar V, Amin R, Obaidat MS, Karthikeyan I (2020) An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map. J Inf Sec Appl 53:102539

    Google Scholar 

  • Tseng H, Jan R, Yang W (2009) A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International conference on communications (ICC’09):1–6.

  • Tso R (2013) Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol. J Supercomput 66(2):863–874

    Google Scholar 

  • Wang RC, Mo KR (2006) Security enhancement on efficient verifier-based key agreement protocol for three parties without server’s public key. Int Math Forum 1(20):965–972

    MathSciNet  MATH  Google Scholar 

  • Wang Q, Ruan O, Wang Z (2017) Security analysis and improvements of three-party password-based authenticated key exchange protocol. International conference on emerging internetworking, data and web technologies. Springer, Cham, pp 497–508

    Google Scholar 

  • Wei J, Hu X, Liu W (2012) An improved authentication scheme for telecare medicine information systems. J Med Syst 36(6):3597–3604

    Google Scholar 

  • Wen F, Guo D (2014) An improved anonymous authentication scheme for telecare medical information systems. J Med Syst. https://doi.org/10.1007/s10916-014-0026-0

    Article  Google Scholar 

  • Wen HA, Lee TF, Hwang T (2005) Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEEE Proc-Commun 152(2):138–143

    MATH  Google Scholar 

  • Wu ZY, Lee YC, Lai F, Lee HC, Chung Y (2012) A secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1529–1535

    Google Scholar 

  • Yang XJ, Baleanu D, Srivastava HM (2015) Local fractional integral transforms and their applications. Academic Press, Cambridge

    MATH  Google Scholar 

  • Yau WC, Phan RCW (2013) Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst. https://doi.org/10.1007/s10916-013-9993-9

    Article  Google Scholar 

  • Yeh HT, Sun HM, Hwang T (2003) Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. J Inf Sci Eng 19(6):1059–1070

    Google Scholar 

  • Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit Fract 37(3):669–674

    MathSciNet  MATH  Google Scholar 

  • Zhang Q, Chaudhary P, Kumari S, Kong Z, Liu W (2019) Verifier-based anonymous password-authenticated key exchange protocol in the standard model. Math Biosci Eng 16(5):3623–3640

    MathSciNet  MATH  Google Scholar 

  • Zhu Z (2012) An efficient authentication scheme for telecare medicine information systems. J Med Syst 36(6):3833–3838

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank anonymous reviewers of soft computing for their careful and helpful comments. This work was supported by the Science and Engineering Research Board (SERB), a statutory body of Department of Science and Technology (DST), Govt. of India, under the Project grant (File No.: EEQ/2021/000278).

Funding

This work was funded by the Science and Engineering Research Board (SERB), a statutory body of Department of Science and Technology (DST), Govt. of India, under the Project grant (File No.: EEQ/2021/000278).

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization: PY; CM; RWI; Formal analysis: SKB; MAA; Investigation: PY; CM; RWI; Methodology: CM; PY; RWI; Resources: CM; Software: MAA; Supervision: CM; PY; RWI; Validation/Visualization: CM; PY; RWI; Writing—original draft: CM; PY; RWI; Writing—review and editing: PY; CM; RWI; MAA.

Corresponding author

Correspondence to Chandrashekhar Meshram.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Not available.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yupapin, P., Meshram, C., Barve, S.K. et al. An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems. Soft Comput 27, 6033–6047 (2023). https://doi.org/10.1007/s00500-023-07889-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-07889-4

Keywords

Navigation