LEASE: Lattice and ECC-based Authentication and Integrity Verification Scheme in E-Healthcare

被引:0
|
作者
Dua, Amit [1 ]
Chaudhary, Rajat [2 ]
Aujla, Gagangeet Singh [3 ]
Jindal, Anish [2 ]
Kumar, Neeraj [2 ]
Rodrigues, Joel J. P. C. [4 ,5 ,6 ,7 ]
机构
[1] BITS Pilani, Dept Comp Sci & Informat Syst, Pilani, Rajasthan, India
[2] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Pilani, Rajasthan, India
[3] Chandigarh Univ, Comp Sci & Engn Dept, Gharuan, Punjab, India
[4] Natl Inst Telecommun Inatel, Santa Rita Do Sapucai, Brazil
[5] Inst Telecomunicacoes, Lisbon, Portugal
[6] ITMO Univ, Moscow, Russia
[7] Univ Fortaleza UNIFOR, Fortaleza, Ceara, Brazil
关键词
Elliptic curve cryptography (ECG); lattice-based authentication; secure e-healthcare; PRIVACY; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security has become one of major concern especially in critical applications like e-healthcare. To cater to the security needs in e-healthcare, this paper proposes a novel scheme which prevents data from unauthorized fabrication and preserves the integrity of data. The proposed scheme also removes overhead of integrity validation from user's end as this work is assigned to a trusted third party, i.e., a proxy server. For this purpose, the patient's data given by user is sent to proxy server along with user's signature where it is broken down in the form of blocks. A 'tag' is then generated for each block using lightweight elliptic curve cryptography (ECC). This block-tag pair is then uploaded on the data server which is used for integrity checking. Whenever a patient's data access request is raised, the block of data is retrieved using tag value and integrity is then verified. In addition to it, a lightweight lattice-based authentication scheme is proposed in the paper to authenticate the users. The request is served only when the user is deemed authentic and there is no modification in the original data sent by the user. The effectiveness of the proposed authentication scheme has been proven by performing its analysis in terms of computation time and communication cost. Moreover, the superiority of the proposed data integrity scheme has been validated by comparing it with the traditional discrete logarithmic scheme.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (04): : 3086 - 3104
  • [22] A provably secure ECC-based roaming authentication scheme for global mobility networks
    Nikooghadam, Mahdi
    Amintoosi, Haleh
    Kumari, Saru
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54 (54)
  • [23] A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
    Kumari, Saru
    Renuka, Km.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (03)
  • [24] A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
    Nam, Junghyun
    Kim, Moonseong
    Paik, Juryon
    Lee, Youngsook
    Won, Dongho
    SENSORS, 2014, 14 (11): : 21023 - 21044
  • [25] ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Ahmad, Sultan
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2025, 21 (01) : 56 - 75
  • [26] Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP
    Mahdi Nikooghadam
    Haleh Amintoosi
    The Journal of Supercomputing, 2020, 76 : 3086 - 3104
  • [27] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejia
    Seys, Stefaan
    Singelee, Dave
    Verbanwhede, Ingrid
    RFID SECURITY AND PRIVACY, 2012, 7055 : 183 - 201
  • [28] An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring
    Mohit, Prerna
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [29] A Novel ECC-based RFID Authentication Protocol
    Fang Mingwei
    Wu Junjun
    Zhang Xinfang
    Chen Hong
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1764 - +
  • [30] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejla
    Seys, Stefaan
    Singelee, Dave
    Verbauwhede, Ingrid
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 183 - 201