A Note on "Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services"

被引:0
|
作者
Cao, Zhengjun [1 ]
机构
[1] Shanghai Univ, Newtouch Ctr Math, Dept Math, Shangda Rd 99, Shanghai 200444, Peoples R China
关键词
Biometrics; Key agreement; Mutual authentication; Elliptic curve; User anonymity;
D O I
10.1007/s11277-024-10881-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We show that the Kumari-Renuka key agreement scheme (Wirel Pers Commun 117:27-45, 2021) fails to keep user anonymity, not as claimed, because an adversary can retrieve the user's identity IDi\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ID_i$$\end{document} from the pseudonym PIDi\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$PID_i$$\end{document}. The loss of anonymity originates from the misuse of bitwise operator, which requires that both operands have an equal bit-length, otherwise the partial string in the long operand will be exposed. We also suggest a remedy method to fix the flaw by using a hash function to convert a point over the underlying elliptic curve into a random string with fixed length.
引用
收藏
页码:2439 / 2444
页数:6
相关论文
共 50 条
  • [1] A Note on “Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services”
    Zhengjun Cao
    Wireless Personal Communications, 2023, 133 : 2439 - 2444
  • [2] Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services
    Kumari, Saru
    Renuka, Km
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (01) : 27 - 45
  • [3] Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services
    Saru Kumari
    Km. Renuka
    Wireless Personal Communications, 2021, 117 : 27 - 45
  • [4] A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems
    Lin, Han-Yu
    PLOS ONE, 2018, 13 (12):
  • [5] A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Chen, Song-Jhih
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [6] A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems
    Chun-Ta Li
    Cheng-Chi Lee
    Chi-Yao Weng
    Song-Jhih Chen
    Journal of Medical Systems, 2016, 40
  • [7] Efficient Joint Key Authentication Model in E-Healthcare
    Sajjad, Muhammad
    Malik, Tauqeer Safdar
    Khurram, Shahzada
    Gardezi, Akber Abid
    Alassery, Fawaz
    Hamam, Habib
    Cheikhrouhou, Omar
    Shafiq, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 2739 - 2753
  • [8] ECC-based lightweight authentication and access control scheme for IoT E-healthcare
    Yao, Hailong
    Yan, Qiao
    Fu, Xingbing
    Zhang, Zhibin
    Lan, Caihui
    SOFT COMPUTING, 2022, 26 (09) : 4441 - 4461
  • [9] ECC-based lightweight authentication and access control scheme for IoT E-healthcare
    Hailong Yao
    Qiao Yan
    Xingbing Fu
    Zhibin Zhang
    Caihui Lan
    Soft Computing, 2022, 26 : 4441 - 4461
  • [10] A robust and lightweight secure access scheme for cloud based E-healthcare services
    Mehedi Masud
    Gurjot Singh Gaba
    Karanjeet Choudhary
    Roobaea Alroobaea
    M. Shamim Hossain
    Peer-to-Peer Networking and Applications, 2021, 14 : 3043 - 3057