Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”

The health-care delivery services were made possible by telecare medicine information systems (TMIS). These systems are paving the way for a world where computerised telecare facilities and automated patient medical records are the norm. Authentication schemes are common mechanisms for preventing un...

Full description

Bibliographic Details
Published in:Cyber Security and Applications
Main Authors: Anjali Singh, Marimuthu Karuppiah, Rajendra Prasad Mahapatra
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2023-12-01
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S277291842200008X
Description
Summary:The health-care delivery services were made possible by telecare medicine information systems (TMIS). These systems are paving the way for a world where computerised telecare facilities and automated patient medical records are the norm. Authentication schemes are common mechanisms for preventing unauthorised access to medical records via insecure networks. Amin and Biswas recently proposed an authentication scheme for TMIS, asserting that their scheme can withstand various attacks. Despite this, their scheme still has significant security weaknesses. In this paper, we present a cryptanalysis of Amin and Biswas’ scheme and show that it is subject to a variety of attacks.
ISSN:2772-9184