LEASE: Lattice and ECC-based Authentication and Integrity Verification Scheme in E-Healthcare

被引:0
|
作者
Dua, Amit [1 ]
Chaudhary, Rajat [2 ]
Aujla, Gagangeet Singh [3 ]
Jindal, Anish [2 ]
Kumar, Neeraj [2 ]
Rodrigues, Joel J. P. C. [4 ,5 ,6 ,7 ]
机构
[1] BITS Pilani, Dept Comp Sci & Informat Syst, Pilani, Rajasthan, India
[2] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Pilani, Rajasthan, India
[3] Chandigarh Univ, Comp Sci & Engn Dept, Gharuan, Punjab, India
[4] Natl Inst Telecommun Inatel, Santa Rita Do Sapucai, Brazil
[5] Inst Telecomunicacoes, Lisbon, Portugal
[6] ITMO Univ, Moscow, Russia
[7] Univ Fortaleza UNIFOR, Fortaleza, Ceara, Brazil
关键词
Elliptic curve cryptography (ECG); lattice-based authentication; secure e-healthcare; PRIVACY; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security has become one of major concern especially in critical applications like e-healthcare. To cater to the security needs in e-healthcare, this paper proposes a novel scheme which prevents data from unauthorized fabrication and preserves the integrity of data. The proposed scheme also removes overhead of integrity validation from user's end as this work is assigned to a trusted third party, i.e., a proxy server. For this purpose, the patient's data given by user is sent to proxy server along with user's signature where it is broken down in the form of blocks. A 'tag' is then generated for each block using lightweight elliptic curve cryptography (ECC). This block-tag pair is then uploaded on the data server which is used for integrity checking. Whenever a patient's data access request is raised, the block of data is retrieved using tag value and integrity is then verified. In addition to it, a lightweight lattice-based authentication scheme is proposed in the paper to authenticate the users. The request is served only when the user is deemed authentic and there is no modification in the original data sent by the user. The effectiveness of the proposed authentication scheme has been proven by performing its analysis in terms of computation time and communication cost. Moreover, the superiority of the proposed data integrity scheme has been validated by comparing it with the traditional discrete logarithmic scheme.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System
    Rifaqat Ali
    Arup Kumar Pal
    Arabian Journal for Science and Engineering, 2018, 43 : 7837 - 7852
  • [32] Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System
    Ali, Rifaqat
    Pal, Arup Kumar
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7837 - 7852
  • [33] An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network
    Huang, Huihui
    Miao, Xuyang
    Wu, Zehui
    Wei, Qiang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [34] ECCbAS: An ECC based authentication scheme for healthcare IoT systems
    Servati, Mohammad Reza
    Safkhani, Masoumeh
    PERVASIVE AND MOBILE COMPUTING, 2023, 90
  • [35] Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services
    Kumari, Saru
    Renuka, Km
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (01) : 27 - 45
  • [36] A Highly Efficient ECC-Based Authentication Protocol for RFID
    Alaoui, Hasnae Lamrani
    El Ghazi, Abdellatif
    Zbakh, Mustapha
    Touhafi, Abdellah
    Braeken, An
    JOURNAL OF SENSORS, 2021, 2021
  • [37] Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services
    Saru Kumari
    Km. Renuka
    Wireless Personal Communications, 2021, 117 : 27 - 45
  • [38] ECC-based RFID/NFC Mutual Authentication Protocol
    Huo, Weiguang
    Dong, Qingkuan
    Chen, Yuan
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2015), 2015, 33 : 169 - 177
  • [39] A Secure and Efficient ECC-Based Anonymous Authentication Protocol
    Wang, Feifei
    Xu, Guoai
    Gu, Lize
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [40] New ECC-Based Remote User Authentication Scheme with Key Agreement Using Smart Cards
    Hsu, Chien-Lung
    Tsai, Kuo-Yu
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (04): : 601 - 608