An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS
In healthcare services, telecare medicine information systems (TMIS) is the viable solution offered currently. Moreover, to provide best security to the TMIS, it attracted the various researchers to investigate the security challenges in TMIS. Subsequently, the security of TMIS is improving but the...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2021-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/9500195/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846128630515630080 |
|---|---|
| author | Vishesh P. Gaikwad Jitendra V. Tembhurne Chandrashekhar Meshram Cheng-Chi Lee Chun-Ta Li |
| author_facet | Vishesh P. Gaikwad Jitendra V. Tembhurne Chandrashekhar Meshram Cheng-Chi Lee Chun-Ta Li |
| author_sort | Vishesh P. Gaikwad |
| collection | DOAJ |
| description | In healthcare services, telecare medicine information systems (TMIS) is the viable solution offered currently. Moreover, to provide best security to the TMIS, it attracted the various researchers to investigate the security challenges in TMIS. Subsequently, the security of TMIS is improving but the application becoming widespread hence needs robust security technique. An efficient verifier-based 3-party authentication technique in telecare medicine information systems for data exchange, which permits only two users/patients to store their verifier in the database of an authentication server, computed using own password. The authentication system will then validate the user’s verifier and help them safely and easily share electronic medical records. In this work, we present an efficient provably secure verifier-based 3-party authentication technique using partial discrete logarithm (PDL) for exchanging data in TMIS. The presented technique not utilizing any public keys of the server, and does not require additional messages and number for key confirmation rounds. The proposed technique has higher security compared to the related verifier-based methods, has lower computational costs and fewer communications, and is therefore ideal for TMIS. |
| format | Article |
| id | doaj-art-a7fe1bf399b84b05b22dab98f8cd0f2f |
| institution | Kabale University |
| issn | 2169-3536 |
| language | English |
| publishDate | 2021-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-a7fe1bf399b84b05b22dab98f8cd0f2f2024-12-11T00:02:24ZengIEEEIEEE Access2169-35362021-01-01910858610860010.1109/ACCESS.2021.31011119500195An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMISVishesh P. Gaikwad0Jitendra V. Tembhurne1https://orcid.org/0000-0002-1389-3456Chandrashekhar Meshram2https://orcid.org/0000-0003-2434-8928Cheng-Chi Lee3https://orcid.org/0000-0002-8918-1703Chun-Ta Li4https://orcid.org/0000-0003-0637-5666Department of Computer Science and Engineering, Indian Institute of Information Technology at Nagpur, Nagpur, IndiaDepartment of Computer Science and Engineering, Indian Institute of Information Technology at Nagpur, Nagpur, IndiaDepartment of Post Graduate Studies and Research in Mathematics, Jayawanti Haksar Government Post-Graduation College, College of Chhindwara University, Betul, Madhya Pradesh, IndiaDepartment of Library and Information Science, Research and Development Center for Physical Education, Health, and Information Technology, Fu Jen Catholic University, New Taipei City, TaiwanDepartment of Information Management, Tainan University of Technology, Tainan, TaiwanIn healthcare services, telecare medicine information systems (TMIS) is the viable solution offered currently. Moreover, to provide best security to the TMIS, it attracted the various researchers to investigate the security challenges in TMIS. Subsequently, the security of TMIS is improving but the application becoming widespread hence needs robust security technique. An efficient verifier-based 3-party authentication technique in telecare medicine information systems for data exchange, which permits only two users/patients to store their verifier in the database of an authentication server, computed using own password. The authentication system will then validate the user’s verifier and help them safely and easily share electronic medical records. In this work, we present an efficient provably secure verifier-based 3-party authentication technique using partial discrete logarithm (PDL) for exchanging data in TMIS. The presented technique not utilizing any public keys of the server, and does not require additional messages and number for key confirmation rounds. The proposed technique has higher security compared to the related verifier-based methods, has lower computational costs and fewer communications, and is therefore ideal for TMIS.https://ieeexplore.ieee.org/document/9500195/TMISpartial discrete logarithmdata exchangeauthenticationentropy smoothing hash function |
| spellingShingle | Vishesh P. Gaikwad Jitendra V. Tembhurne Chandrashekhar Meshram Cheng-Chi Lee Chun-Ta Li An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS IEEE Access TMIS partial discrete logarithm data exchange authentication entropy smoothing hash function |
| title | An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS |
| title_full | An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS |
| title_fullStr | An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS |
| title_full_unstemmed | An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS |
| title_short | An Efficient Provably Secure Verifier-Based Three-Factor Authentication Technique Using PDL for Data Exchange in TMIS |
| title_sort | efficient provably secure verifier based three factor authentication technique using pdl for data exchange in tmis |
| topic | TMIS partial discrete logarithm data exchange authentication entropy smoothing hash function |
| url | https://ieeexplore.ieee.org/document/9500195/ |
| work_keys_str_mv | AT visheshpgaikwad anefficientprovablysecureverifierbasedthreefactorauthenticationtechniqueusingpdlfordataexchangeintmis AT jitendravtembhurne anefficientprovablysecureverifierbasedthreefactorauthenticationtechniqueusingpdlfordataexchangeintmis AT chandrashekharmeshram anefficientprovablysecureverifierbasedthreefactorauthenticationtechniqueusingpdlfordataexchangeintmis AT chengchilee anefficientprovablysecureverifierbasedthreefactorauthenticationtechniqueusingpdlfordataexchangeintmis AT chuntali anefficientprovablysecureverifierbasedthreefactorauthenticationtechniqueusingpdlfordataexchangeintmis AT visheshpgaikwad efficientprovablysecureverifierbasedthreefactorauthenticationtechniqueusingpdlfordataexchangeintmis AT jitendravtembhurne efficientprovablysecureverifierbasedthreefactorauthenticationtechniqueusingpdlfordataexchangeintmis AT chandrashekharmeshram efficientprovablysecureverifierbasedthreefactorauthenticationtechniqueusingpdlfordataexchangeintmis AT chengchilee efficientprovablysecureverifierbasedthreefactorauthenticationtechniqueusingpdlfordataexchangeintmis AT chuntali efficientprovablysecureverifierbasedthreefactorauthenticationtechniqueusingpdlfordataexchangeintmis |