LEASE: Lattice and ECC-based Authentication and Integrity Verification Scheme in E-Healthcare

被引:0
|
作者
Dua, Amit [1 ]
Chaudhary, Rajat [2 ]
Aujla, Gagangeet Singh [3 ]
Jindal, Anish [2 ]
Kumar, Neeraj [2 ]
Rodrigues, Joel J. P. C. [4 ,5 ,6 ,7 ]
机构
[1] BITS Pilani, Dept Comp Sci & Informat Syst, Pilani, Rajasthan, India
[2] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Pilani, Rajasthan, India
[3] Chandigarh Univ, Comp Sci & Engn Dept, Gharuan, Punjab, India
[4] Natl Inst Telecommun Inatel, Santa Rita Do Sapucai, Brazil
[5] Inst Telecomunicacoes, Lisbon, Portugal
[6] ITMO Univ, Moscow, Russia
[7] Univ Fortaleza UNIFOR, Fortaleza, Ceara, Brazil
关键词
Elliptic curve cryptography (ECG); lattice-based authentication; secure e-healthcare; PRIVACY; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security has become one of major concern especially in critical applications like e-healthcare. To cater to the security needs in e-healthcare, this paper proposes a novel scheme which prevents data from unauthorized fabrication and preserves the integrity of data. The proposed scheme also removes overhead of integrity validation from user's end as this work is assigned to a trusted third party, i.e., a proxy server. For this purpose, the patient's data given by user is sent to proxy server along with user's signature where it is broken down in the form of blocks. A 'tag' is then generated for each block using lightweight elliptic curve cryptography (ECC). This block-tag pair is then uploaded on the data server which is used for integrity checking. Whenever a patient's data access request is raised, the block of data is retrieved using tag value and integrity is then verified. In addition to it, a lightweight lattice-based authentication scheme is proposed in the paper to authenticate the users. The request is served only when the user is deemed authentic and there is no modification in the original data sent by the user. The effectiveness of the proposed authentication scheme has been proven by performing its analysis in terms of computation time and communication cost. Moreover, the superiority of the proposed data integrity scheme has been validated by comparing it with the traditional discrete logarithmic scheme.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Wenfeng Huang
    Scientific Reports, 14
  • [42] Security analysis and design of an efficient ECC-based two-factor password authentication scheme
    Maitra, Tanmoy
    Obaidat, Mohammad S.
    Islam, Sk Hafizul
    Giri, Debasis
    Amin, Ruhul
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4166 - 4181
  • [43] Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
    Park, Kisung
    Kim, Myeonghyun
    Park, Youngho
    SENSORS, 2025, 25 (01)
  • [44] A Secure Authentication Protocol for Multi-Sever-Based E-Healthcare Using a Fuzzy Commitment Scheme
    Barman, Subhas
    Shum, Hubert P. H.
    Chattopadhyay, Samiran
    Samanta, Debasis
    IEEE ACCESS, 2019, 7 : 12557 - 12574
  • [45] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks
    Huang, Wenfeng
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [46] A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    AD HOC NETWORKS, 2014, 18 : 133 - 146
  • [47] A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems
    Lin, Han-Yu
    PLOS ONE, 2018, 13 (12):
  • [48] A Note on “Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services”
    Zhengjun Cao
    Wireless Personal Communications, 2023, 133 : 2439 - 2444
  • [49] A Note on "Design of a Password Authentication and Key Agreement Scheme to Access e-Healthcare Services"
    Cao, Zhengjun
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 133 (04) : 2439 - 2444
  • [50] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225