A Note on "Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services"

被引:0
|
作者
Cao, Zhengjun [1 ]
机构
[1] Shanghai Univ, Newtouch Ctr Math, Dept Math, Shangda Rd 99, Shanghai 200444, Peoples R China
关键词
Biometrics; Key agreement; Mutual authentication; Elliptic curve; User anonymity;
D O I
10.1007/s11277-024-10881-2
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We show that the Kumari-Renuka key agreement scheme (Wirel Pers Commun 117:27-45, 2021) fails to keep user anonymity, not as claimed, because an adversary can retrieve the user's identity IDi\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ID_i$$\end{document} from the pseudonym PIDi\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$PID_i$$\end{document}. The loss of anonymity originates from the misuse of bitwise operator, which requires that both operands have an equal bit-length, otherwise the partial string in the long operand will be exposed. We also suggest a remedy method to fix the flaw by using a hash function to convert a point over the underlying elliptic curve into a random string with fixed length.
引用
收藏
页码:2439 / 2444
页数:6
相关论文
共 50 条
  • [11] A robust and lightweight secure access scheme for cloud based E-healthcare services
    Masud, Mehedi
    Gaba, Gurjot Singh
    Choudhary, Karanjeet
    Alroobaea, Roobaea
    Hossain, M. Shamim
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 3043 - 3057
  • [12] A Secure and Efficient Information Authentication Scheme for E-Healthcare System
    Khan, Naveed
    Zhang, Jianbiao
    Mallah, Ghulam Ali
    Chaudhry, Shehzad Ashraf
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (03): : 3877 - 3896
  • [13] An Authentication Scheme for Secure Access to Healthcare Services
    Muhammad Khurram Khan
    Saru Kumari
    Journal of Medical Systems, 2013, 37
  • [14] An Authentication Scheme for Secure Access to Healthcare Services
    Khan, Muhammad Khurram
    Kumari, Saru
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (04)
  • [15] A Design of e-Healthcare Authentication Framework with QR Code
    Thiranant, Non
    Lee, HoonJae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 79 - 86
  • [16] Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service
    Sahu, Amiya Kumar
    Sharma, Suraj
    Puthal, Deepak
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 17 (02)
  • [17] Lightweight Authentication Scheme for IoT Based E-Healthcare Service Communication
    Salim, Mikail Mohammed
    Yang, Laurence Tianruo
    Park, Jong Hyuk
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2024, 28 (09) : 5025 - 5032
  • [18] An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring
    Mohit, Prerna
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [19] An efficient mutual authentication and key agreement scheme without password for wireless sensor networks
    Yulei Chen
    Jianhua Chen
    The Journal of Supercomputing, 2021, 77 : 13653 - 13675
  • [20] A secure remote password authentication scheme with key agreement for multi-server environments
    Lee, Wei-Bin
    Wu, Chia-Chun
    Tsaur, Woei-Jiunn
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 5, 2005, : 19 - 23