{"title":"智能卡密码分析及基于生物特征哈希的认证方案","authors":"Narendra Panwar, M. Rauthan, Amit Agarwal","doi":"10.1109/NGCT.2016.7877525","DOIUrl":null,"url":null,"abstract":"Online healthcare system provides healthcare services remotely to the patient which include telecare medicine system, patient monitoring system, patient healthcare system etc. Authentication schemes plays a significant and crucial role in providing legitimacy of patient and protection to medical resources/services. New trends in cryptography make the online healthcare services feasible solution to the patient and healthcare sector. It aims to help the medical physician and healthcare workers to make fast and accurate clinical decision. This paper discusses the security vulnerabilities of Das et al scheme and demonstrates various security attack. Our cryptanalysis proves the weakness of their scheme against the login phase and authentication phase.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cryptanalysis of smart card and biometric-hash based authentication scheme\",\"authors\":\"Narendra Panwar, M. Rauthan, Amit Agarwal\",\"doi\":\"10.1109/NGCT.2016.7877525\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Online healthcare system provides healthcare services remotely to the patient which include telecare medicine system, patient monitoring system, patient healthcare system etc. Authentication schemes plays a significant and crucial role in providing legitimacy of patient and protection to medical resources/services. New trends in cryptography make the online healthcare services feasible solution to the patient and healthcare sector. It aims to help the medical physician and healthcare workers to make fast and accurate clinical decision. This paper discusses the security vulnerabilities of Das et al scheme and demonstrates various security attack. Our cryptanalysis proves the weakness of their scheme against the login phase and authentication phase.\",\"PeriodicalId\":326018,\"journal\":{\"name\":\"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NGCT.2016.7877525\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGCT.2016.7877525","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptanalysis of smart card and biometric-hash based authentication scheme
Online healthcare system provides healthcare services remotely to the patient which include telecare medicine system, patient monitoring system, patient healthcare system etc. Authentication schemes plays a significant and crucial role in providing legitimacy of patient and protection to medical resources/services. New trends in cryptography make the online healthcare services feasible solution to the patient and healthcare sector. It aims to help the medical physician and healthcare workers to make fast and accurate clinical decision. This paper discusses the security vulnerabilities of Das et al scheme and demonstrates various security attack. Our cryptanalysis proves the weakness of their scheme against the login phase and authentication phase.