LEASE: Lattice and ECC-based Authentication and Integrity Verification Scheme in E-Healthcare

被引:0
|
作者
Dua, Amit [1 ]
Chaudhary, Rajat [2 ]
Aujla, Gagangeet Singh [3 ]
Jindal, Anish [2 ]
Kumar, Neeraj [2 ]
Rodrigues, Joel J. P. C. [4 ,5 ,6 ,7 ]
机构
[1] BITS Pilani, Dept Comp Sci & Informat Syst, Pilani, Rajasthan, India
[2] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Pilani, Rajasthan, India
[3] Chandigarh Univ, Comp Sci & Engn Dept, Gharuan, Punjab, India
[4] Natl Inst Telecommun Inatel, Santa Rita Do Sapucai, Brazil
[5] Inst Telecomunicacoes, Lisbon, Portugal
[6] ITMO Univ, Moscow, Russia
[7] Univ Fortaleza UNIFOR, Fortaleza, Ceara, Brazil
关键词
Elliptic curve cryptography (ECG); lattice-based authentication; secure e-healthcare; PRIVACY; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security has become one of major concern especially in critical applications like e-healthcare. To cater to the security needs in e-healthcare, this paper proposes a novel scheme which prevents data from unauthorized fabrication and preserves the integrity of data. The proposed scheme also removes overhead of integrity validation from user's end as this work is assigned to a trusted third party, i.e., a proxy server. For this purpose, the patient's data given by user is sent to proxy server along with user's signature where it is broken down in the form of blocks. A 'tag' is then generated for each block using lightweight elliptic curve cryptography (ECC). This block-tag pair is then uploaded on the data server which is used for integrity checking. Whenever a patient's data access request is raised, the block of data is retrieved using tag value and integrity is then verified. In addition to it, a lightweight lattice-based authentication scheme is proposed in the paper to authenticate the users. The request is served only when the user is deemed authentic and there is no modification in the original data sent by the user. The effectiveness of the proposed authentication scheme has been proven by performing its analysis in terms of computation time and communication cost. Moreover, the superiority of the proposed data integrity scheme has been validated by comparing it with the traditional discrete logarithmic scheme.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] ECC-based lightweight authentication and access control scheme for IoT E-healthcare
    Yao, Hailong
    Yan, Qiao
    Fu, Xingbing
    Zhang, Zhibin
    Lan, Caihui
    SOFT COMPUTING, 2022, 26 (09) : 4441 - 4461
  • [2] ECC-based lightweight authentication and access control scheme for IoT E-healthcare
    Hailong Yao
    Qiao Yan
    Xingbing Fu
    Zhibin Zhang
    Caihui Lan
    Soft Computing, 2022, 26 : 4441 - 4461
  • [3] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270
  • [4] An Anonymous and Efficient ECC-Based Authentication Scheme for SIP
    Zhou, Yousheng
    Chen, Xinyun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [5] On the Security of an ECC-Based Authentication Scheme for Internet of Drones
    Zhang, Min
    Xu, Chunxiang
    Li, Shanshan
    Jiang, Changsong
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6425 - 6428
  • [6] An Untraceable ECC-Based Remote User Authentication Scheme
    Mehmood, Zahid
    Chen, Gongliang
    Li, Jianhua
    Albeshri, Aiiad
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (03): : 1742 - 1760
  • [7] ECC-Based Authentication Scheme for Cloud-Based Robots
    Saurabh Jain
    C. Nandhini
    Rajesh Doriya
    Wireless Personal Communications, 2021, 117 : 1557 - 1576
  • [8] ECC-Based Authentication Scheme for Cloud-Based Robots
    Jain, Saurabh
    Nandhini, C.
    Doriya, Rajesh
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (02) : 1557 - 1576
  • [9] A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications
    Arezou Ostad-Sharif
    Dariush Abbasinezhad-Mood
    Morteza Nikooghadam
    Journal of Medical Systems, 2019, 43
  • [10] A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
    Hammi, Badis
    Fayad, Achraf
    Khatoun, Rida
    Zeadally, Sherali
    Begriche, Youcef
    IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3440 - 3450